The paleo-temperature(Th)data from fluid inclusions are utilized for thermal history modelling using PetroMod software.Generally,bottom hole temperature(BHT)and vitrinite reflectance(Ro)measurements are widely used in...The paleo-temperature(Th)data from fluid inclusions are utilized for thermal history modelling using PetroMod software.Generally,bottom hole temperature(BHT)and vitrinite reflectance(Ro)measurements are widely used in petroleum system modelling(PSM)in the oil industry for calibration purposes.Th representing the minimum temperature of fluid entrapment estimated from fluid-inclusion study provides extra support to build the thermal models for PSM.Fluid inclusion parameters along with Rock-Eval pyrolysis analysis have been used to predict the maturity of oil in terms of API gravity as well as the maturity of source rocks respectively.Two exploratory wells RV-1(Mumbai Offshore Basin)and KK4C-A-1(Kerala-Konkan Offshore Basin),India were examined and the T_(h)from most of the fluid inclusions of wells RV-1 and KK4C-A-1 fell in the oil window range of 60-140℃suggesting thermal conditions favourable for oil generation in both of the wells.T_(h)of coeval aqueous inclusions along with the Hydrocarbon Fluid inclusions(HCFIs)was used to calibrate PSM.Vital parameters show that source rocks of well RV-1 are mature and that of well KK4C-A-1 are immature.Two sets of PSM are created in terms of generation and expulsion for the dry wells RV-1 and KK4C-A-1 and calibrated each well using fluid inclusion Th and BHT.From the fluid inclusion analysis method,it is evident that hydrocarbon generation happened in both wells and the paleo-temperature indicates that the formations of both wells were subjected to temperatures in the oil window range,even though it was designated as dry wells in the present scenario.The present study highlights the application of fluid inclusion paleo-temperature(Th)during calibration instead of commonly used methods.We could obtain desirable and accurate data output from PSM using T_(h) calibration.展开更多
Objectives This study aimed to clarify the relationship between the content of proxy decision-making made by families of patients with malignant brain tumors regarding treatment policies and daily care and the cues le...Objectives This study aimed to clarify the relationship between the content of proxy decision-making made by families of patients with malignant brain tumors regarding treatment policies and daily care and the cues leading to those decisions.Methods Semi-structured personal interviews were used to collect data.Seven family members of patients with malignant brain tumors were selected to participate in the study by purposive sampling method from June to August 2022 in the Patient Family Association of Japan.Responses were content analyzed to explore the relationship between the content of decisions regarding“treatment policies”and“daily care”and the cues influencing those decisions.Semi-structured interviews were analyzed by using thematic analysis.Results The contents of proxy decisions regarding“treatment policies”included implementation,interruption,and termination of initial treatments,free medical treatments,use of respirators,and end-of-life sedation and included six cues:treatment policies suggested by the primary physician,information and knowledge about the disease and treatment obtained by the family from limited resources,perceived life threat from symptom worsening,words and reactions from the patient regarding treatment,patient’s personality and way of life inferred from their treatment preferences,family’s thoughts and values hoping for better treatment for the patient.Decisions for“daily care”included meal content and methods,excretion,mobility,maintaining cleanliness,rehabilitation,continuation or resignation from work,treatment settings(outpatient or inpatient),and ways to spend time outside and included seven cues:words and thoughts from the patient about their way of life,patient’s reactions and life history inferred from their preferred way of living,things the patient can do to maintain daily life and roles,awareness of the increasing inability to do things in daily life,family’s underlying thoughts and values about how to spend the remaining time,approval from family members regarding the care setting,advice from medical professionals on living at home.Conclusions For“treatment policies,”guidelines from medical professionals were a key cue,while for“daily care,”the small signs from the patients in their daily lives served as cues for proxy decision-making.This may be due to the lack of information available to families and the limited time available for discussion with the patient.Families of patients with malignant brain tumors repeatedly use multiple cues to make proxy decision-making under high uncertainty.Therefore,nurses supporting proxy decision-making should assess the family’s situation and provide cues that facilitate informed and confident decisions.展开更多
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the...With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance.展开更多
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu...Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources.展开更多
Salinity is a fundamental variable of watermass chemistry,often varying strongly in coastal,estuarine,lagoonal,restricted-marine basinal,and non-freshwater lacustrine systems(Figure 1).Salinity variation commonly cont...Salinity is a fundamental variable of watermass chemistry,often varying strongly in coastal,estuarine,lagoonal,restricted-marine basinal,and non-freshwater lacustrine systems(Figure 1).Salinity variation commonly controls other watermass properties(e.g.,redox,temperature,p H,and chemical composition)as well as nutrient levels(and thus bioproductivity).展开更多
建立了一个中等规模的结构向量自回归模型,系统探讨了货币政策不确定性对宏观经济波动与银行系统金融风险的影响。首先,比较现阶段我国主流货币政策不确定性及经济政策不确定性代理指标,发现Huang&Luk (2020)所测度MPU与EPU并不能...建立了一个中等规模的结构向量自回归模型,系统探讨了货币政策不确定性对宏观经济波动与银行系统金融风险的影响。首先,比较现阶段我国主流货币政策不确定性及经济政策不确定性代理指标,发现Huang&Luk (2020)所测度MPU与EPU并不能对我国宏观经济波动做出较好解释。比较而言,Baker et al.(2016)与Davis et al.(2019)的EPU对我国宏观经济波动影响更符合预期,EPU的影响类似于紧缩性供给冲击,导致产出、固定资产投资以及社会零售消费降低,通货膨胀上升。特别是在EPU_Davis指标存在意外正向冲击时,可能导致银行系统金融风险上升。其次,利用条件波动率思想,重新估计货币政策不确定性(MPU_Volatility),发现无论是简约形式或结构形式估计,所获得MPU_Volatility在波动趋势上大体一致,且MPU_Volatility与EPU_Baker及EPU_Davis对宏观经济作用效果存在较大一致,其中MPU_Volatility与EPU_Davis对银行系统金融风险影响一致。最后,进一步将叙事性EPU_Davis指标与MPU_Volatility结合使用,选用Proxy SVAR对货币政策不确定性结构冲击进行识别,这保证了即使存在测量误差情况下,估计偏误也会大幅降低。实证发现MPU对宏观经济变量造成不利影响,导致银行系统金融风险上升并持续较长时间。脉冲响应结果与EPU_Davis及MPU_Volatility结果相似,这一定程度上支持之前结论的稳健。展开更多
The paleo-temperature evolution of Sinian reservoir of Anping (安平) 1 well was rebuilt by taking the method of apatite fission track and Easy%Ro model. The result of apatite fission track determines the accurate bu...The paleo-temperature evolution of Sinian reservoir of Anping (安平) 1 well was rebuilt by taking the method of apatite fission track and Easy%Ro model. The result of apatite fission track determines the accurate burial history and overcomes the flaw that the vitrinite reflectance is taken as paleo-temperature indicator simply. The authors used the laser Raman technique to analyze the methane present in the calcite and quartz fluid inclusions of Sinian reservoir, finding that the methane is water soluble gas. The authors also simulated the paleo-pressure of fluid inclusion by using PVTsim software and finally worked out the methane solubility in water.展开更多
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur...With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost.展开更多
This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a...This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution.展开更多
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
文摘The paleo-temperature(Th)data from fluid inclusions are utilized for thermal history modelling using PetroMod software.Generally,bottom hole temperature(BHT)and vitrinite reflectance(Ro)measurements are widely used in petroleum system modelling(PSM)in the oil industry for calibration purposes.Th representing the minimum temperature of fluid entrapment estimated from fluid-inclusion study provides extra support to build the thermal models for PSM.Fluid inclusion parameters along with Rock-Eval pyrolysis analysis have been used to predict the maturity of oil in terms of API gravity as well as the maturity of source rocks respectively.Two exploratory wells RV-1(Mumbai Offshore Basin)and KK4C-A-1(Kerala-Konkan Offshore Basin),India were examined and the T_(h)from most of the fluid inclusions of wells RV-1 and KK4C-A-1 fell in the oil window range of 60-140℃suggesting thermal conditions favourable for oil generation in both of the wells.T_(h)of coeval aqueous inclusions along with the Hydrocarbon Fluid inclusions(HCFIs)was used to calibrate PSM.Vital parameters show that source rocks of well RV-1 are mature and that of well KK4C-A-1 are immature.Two sets of PSM are created in terms of generation and expulsion for the dry wells RV-1 and KK4C-A-1 and calibrated each well using fluid inclusion Th and BHT.From the fluid inclusion analysis method,it is evident that hydrocarbon generation happened in both wells and the paleo-temperature indicates that the formations of both wells were subjected to temperatures in the oil window range,even though it was designated as dry wells in the present scenario.The present study highlights the application of fluid inclusion paleo-temperature(Th)during calibration instead of commonly used methods.We could obtain desirable and accurate data output from PSM using T_(h) calibration.
文摘Objectives This study aimed to clarify the relationship between the content of proxy decision-making made by families of patients with malignant brain tumors regarding treatment policies and daily care and the cues leading to those decisions.Methods Semi-structured personal interviews were used to collect data.Seven family members of patients with malignant brain tumors were selected to participate in the study by purposive sampling method from June to August 2022 in the Patient Family Association of Japan.Responses were content analyzed to explore the relationship between the content of decisions regarding“treatment policies”and“daily care”and the cues influencing those decisions.Semi-structured interviews were analyzed by using thematic analysis.Results The contents of proxy decisions regarding“treatment policies”included implementation,interruption,and termination of initial treatments,free medical treatments,use of respirators,and end-of-life sedation and included six cues:treatment policies suggested by the primary physician,information and knowledge about the disease and treatment obtained by the family from limited resources,perceived life threat from symptom worsening,words and reactions from the patient regarding treatment,patient’s personality and way of life inferred from their treatment preferences,family’s thoughts and values hoping for better treatment for the patient.Decisions for“daily care”included meal content and methods,excretion,mobility,maintaining cleanliness,rehabilitation,continuation or resignation from work,treatment settings(outpatient or inpatient),and ways to spend time outside and included seven cues:words and thoughts from the patient about their way of life,patient’s reactions and life history inferred from their preferred way of living,things the patient can do to maintain daily life and roles,awareness of the increasing inability to do things in daily life,family’s underlying thoughts and values about how to spend the remaining time,approval from family members regarding the care setting,advice from medical professionals on living at home.Conclusions For“treatment policies,”guidelines from medical professionals were a key cue,while for“daily care,”the small signs from the patients in their daily lives served as cues for proxy decision-making.This may be due to the lack of information available to families and the limited time available for discussion with the patient.Families of patients with malignant brain tumors repeatedly use multiple cues to make proxy decision-making under high uncertainty.Therefore,nurses supporting proxy decision-making should assess the family’s situation and provide cues that facilitate informed and confident decisions.
基金supported by the National Natural Science Foundation of China(Grant No.U24B20146)the National Key Research and Development Plan in China(Grant No.2020YFB1005500)Beijing Natural Science Foundation Project(No.M21034).
文摘With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance.
基金Programs for Science and Technology Development of Henan Province,grant number 242102210152The Fundamental Research Funds for the Universities of Henan Province,grant number NSFRF240620+1 种基金Key Scientific Research Project of Henan Higher Education Institutions,grant number 24A520015Henan Key Laboratory of Network Cryptography Technology,grant number LNCT2022-A11.
文摘Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources.
文摘Salinity is a fundamental variable of watermass chemistry,often varying strongly in coastal,estuarine,lagoonal,restricted-marine basinal,and non-freshwater lacustrine systems(Figure 1).Salinity variation commonly controls other watermass properties(e.g.,redox,temperature,p H,and chemical composition)as well as nutrient levels(and thus bioproductivity).
文摘建立了一个中等规模的结构向量自回归模型,系统探讨了货币政策不确定性对宏观经济波动与银行系统金融风险的影响。首先,比较现阶段我国主流货币政策不确定性及经济政策不确定性代理指标,发现Huang&Luk (2020)所测度MPU与EPU并不能对我国宏观经济波动做出较好解释。比较而言,Baker et al.(2016)与Davis et al.(2019)的EPU对我国宏观经济波动影响更符合预期,EPU的影响类似于紧缩性供给冲击,导致产出、固定资产投资以及社会零售消费降低,通货膨胀上升。特别是在EPU_Davis指标存在意外正向冲击时,可能导致银行系统金融风险上升。其次,利用条件波动率思想,重新估计货币政策不确定性(MPU_Volatility),发现无论是简约形式或结构形式估计,所获得MPU_Volatility在波动趋势上大体一致,且MPU_Volatility与EPU_Baker及EPU_Davis对宏观经济作用效果存在较大一致,其中MPU_Volatility与EPU_Davis对银行系统金融风险影响一致。最后,进一步将叙事性EPU_Davis指标与MPU_Volatility结合使用,选用Proxy SVAR对货币政策不确定性结构冲击进行识别,这保证了即使存在测量误差情况下,估计偏误也会大幅降低。实证发现MPU对宏观经济变量造成不利影响,导致银行系统金融风险上升并持续较长时间。脉冲响应结果与EPU_Davis及MPU_Volatility结果相似,这一定程度上支持之前结论的稳健。
基金supported by the National Basic Research Program of China (No. 2005CB422106)
文摘The paleo-temperature evolution of Sinian reservoir of Anping (安平) 1 well was rebuilt by taking the method of apatite fission track and Easy%Ro model. The result of apatite fission track determines the accurate burial history and overcomes the flaw that the vitrinite reflectance is taken as paleo-temperature indicator simply. The authors used the laser Raman technique to analyze the methane present in the calcite and quartz fluid inclusions of Sinian reservoir, finding that the methane is water soluble gas. The authors also simulated the paleo-pressure of fluid inclusion by using PVTsim software and finally worked out the methane solubility in water.
基金supported by National Key Research and Development Project(No.2020YFB1005500)Beijing Natural Science Foundation Project(No.M21034)。
文摘With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost.
基金Project supported by the General Project of Natural Science Foundation of Hunan Province(Grant Nos.2024JJ5273 and 2023JJ50328)the Scientific Research Project of Education Department of Hunan Province(Grant Nos.22A0049 and 22B0699)。
文摘This paper presents a novel approach to proxy blind signatures in the realm of quantum circuits,aiming to enhance security while safeguarding sensitive information.The main objective of this research is to introduce a quantum proxy blind signature(QPBS)protocol that utilizes quantum logical gates and quantum measurement techniques.The QPBS protocol is constructed by the initial phase,proximal blinding message phase,remote authorization and signature phase,remote validation,and de-blinding phase.This innovative design ensures a secure mechanism for signing documents without revealing the content to the proxy signer,providing practical security authentication in a quantum environment under the assumption that the CNOT gates are securely implemented.Unlike existing approaches,our proposed QPBS protocol eliminates the need for quantum entanglement preparation,thus simplifying the implementation process.To assess the effectiveness and robustness of the QPBS protocol,we conduct comprehensive simulation studies in both ideal and noisy quantum environments on the IBM quantum cloud platform.The results demonstrate the superior performance of the QPBS algorithm,highlighting its resilience against repudiation and forgeability,which are key security concerns in the realm of proxy blind signatures.Furthermore,we have established authentic security thresholds(82.102%)in the presence of real noise,thereby emphasizing the practicality of our proposed solution.
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.