Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ...Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.展开更多
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur...With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost.展开更多
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde...In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme.展开更多
In sensor networks,it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys.In order to solve this problem,the present study proposes a scheme called mult...In sensor networks,it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys.In order to solve this problem,the present study proposes a scheme called multi-conditional proxy broadcast re-encryption(MC-PBRE).The scheme consists of the following roles:the source node,proxy server,and the target node.If the condition is met,the proxy can convert the encrypted data of the source node into data that the target node can directly decrypt.It allows the proxy server to convert the ciphertext of the source node to a new ciphertext of the target node in a different group,while the proxy server does not need to store the key or reveal the plaintext.At the same time,the proxy server cannot obtain any valuable information in the ciphertext.This paper formalizes the concept of MC-PBRE and its security model,and proposes a MC-PBRE scheme of ciphertext security.Finally,the scheme security has been proved in the random oracle.展开更多
Threshold proxy re-encryption(TPRE)can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies,and can also provide normal ...Threshold proxy re-encryption(TPRE)can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies,and can also provide normal services even when certain proxy servers are paralyzed or damaged.A non-interactive identity-based TPRE(IB-TPRE)scheme over lattices is proposed which removes the public key certificates.To accomplish this scheme,Shamir’s secret sharing is employed twice,which not only effectively hides the delegator’s private key information,but also decentralizes the proxy power by splitting the re-encryption key.Robustness means that a combiner can detect a misbehaving proxy server that has sent an invalid transformed ciphertext share.This property is achieved by lattice-based fully homomorphic signatures.As a result,the whole scheme is thoroughly capable of resisting quantum attacks even when they are available.The security of the proposed scheme is based on the decisional learning with error hardness assumption in the standard model.Two typical application scenarios,including a file-sharing system based on a blockchain network and a robust key escrow system with threshold cryptography,are presented.展开更多
In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencry...In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography.展开更多
With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,bus...With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,business secrets and other sensitive information of the users and enterprises.Thus,at present,how to protect,retrieve,and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment.A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server.In this scheme,the user data are divided into files,file indexes and the keyword corresponding to the files,which are respectively encrypted to store.The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes,but re-encrypt the cipher-text of keywords corresponding to the files.Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack.And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption.Furthermore,the scheme does not need to use any secure channels,making it more effective in the cloud environment.展开更多
ADER-WAF methods were first introduced by researchers E.F. Toro and V.A. Titarev. The linear stability criterion for the model equation for the ADER-WAF schemes is CCFL≤1, where CCFLdenotes the Courant-Friedrichs-Lew...ADER-WAF methods were first introduced by researchers E.F. Toro and V.A. Titarev. The linear stability criterion for the model equation for the ADER-WAF schemes is CCFL≤1, where CCFLdenotes the Courant-Friedrichs-Lewy (CFL) coefficient. Toro and Titarev employed CCFL=0.95for their experiments. Nonetheless, we noted that the experiments conducted in this study with CCFL=0.95produced solutions exhibiting spurious oscillations, particularly in the high-order ADER-WAF schemes. The homogeneous one-dimensional (1D) non-linear Shallow Water Equations (SWEs) are the subject of these experiments, specifically the solution of the Riemann Problem (RP) associated with the SWEs. The investigation was conducted on four test problems to evaluate the ADER-WAF schemes of second, third, fourth, and fifth order of accuracy. Each test problem constitutes a RP characterized by different wave patterns in its solution. This research has two primary objectives. We begin by illustrating the procedure for implementing the ADER-WAF schemes for the SWEs, providing the required relations. Afterward, following comprehensive testing, we present the range for the CFL coefficient for each test that yields solutions with diminished or eliminated spurious oscillations.展开更多
Precise and accurate rainfall simulation is essential for Tanzania, where complex topography and diverse climatic influences result in variable precipitation patterns. In this study, the 31st October 2023 to 02nd Nove...Precise and accurate rainfall simulation is essential for Tanzania, where complex topography and diverse climatic influences result in variable precipitation patterns. In this study, the 31st October 2023 to 02nd November 2023 daily observation rainfall was used to assess the performance of 5 land surface models (LSMs) and 7 microphysics schemes (MPs) using the Weather Research and Forecasting (WRF) model. The 35 different simulations were then evaluated using the observation data from the ground stations (OBS) and the gridded satellite (CHIRPS) dataset. It was found that the WSM6 scheme performed better than other MPs even though the performance of the LSMs was dependent on the observation data used. The CLM4 performed better than others when the simulations were compared with OBS whereas the 5 Layer Slab produced the lowest mean absolute error (MAE) and root mean square error (RMSE) values while the Noah-MP and RUC schemes produced the lowest average values of RMSE and MAE respectively when the CHIRPS dataset was used. The difference in performance of land surface models when compared to different sets of observation data was attributed to the fact that each observation dataset had a different number of points over the same area, influencing their performances. Furthermore, it was revealed that the CLM4-WSM6 combination performed better than others in the simulation of this event when it was compared against OBS while the 5 Layer Slab-WSM6 combination performed well when the CHIRPS dataset was used for comparison. This research highlights the critical role of the selection of land surface models and microphysics schemes in forecasting extreme rainfall events and underscores the importance of integrating different observational data for model validation. These findings contribute to improving predictive capabilities for extreme rainfall events in similar climatic regions.展开更多
Proxy re-encryption(PRE)allows users to transfer decryption rights to the data requester via proxy.Due to the current PRE schemes from lattice(LPRE)cannot fulfill chosen-ciphertext attack(CCA)security,an identity-base...Proxy re-encryption(PRE)allows users to transfer decryption rights to the data requester via proxy.Due to the current PRE schemes from lattice(LPRE)cannot fulfill chosen-ciphertext attack(CCA)security,an identity-based PRE(IB-PRE)scheme from learning with errors over ring(RLWE)assumption with ciphertext evolution(IB-LPRE-CE)was proposed.IB-LPRE-CE generates the private key using the preimage sampling algorithm(SamplePre)and completes the ciphertext delegation using the re-encryption algorithm.In addition,for the problem of ciphertext delegation change caused by the long-term secret key update,the idea of PRE is used to complete ciphertext evolution and the modification of ciphertext delegation,which improves the efficiency of secure data sharing.In terms of security,IB-LPRE-CE is CCA security based on RLWE assumption.Compared with the current LPRE schemes,IB-LPRE-CE offers greater security and improves the computational efficiency of the encryption algorithm.展开更多
In this study,the Betts-Miller-Janjic(BMJ)convective adjustment scheme in the Weather Research and Forecasting(WRF)model version 4.0 was used to investigate the effect of itsα-parameter,which influences the first-gue...In this study,the Betts-Miller-Janjic(BMJ)convective adjustment scheme in the Weather Research and Forecasting(WRF)model version 4.0 was used to investigate the effect of itsα-parameter,which influences the first-guess potential temperature reference profile on the Madden-Julian oscillation(MJO)propagation and structure.This study diagnosed the MJO active phase composites of the MJO-filtered outgoing longwave radiation(OLR)during the December-to-February(DJF)period of 2006-2016 over the Indian Ocean(IO),Maritime Continent(MC),and western Pacific(WP).The results show that the MJO-filtered OLR intensity,propagation pattern,and MJO classification(standing,jumping,and propagating clusters)are sensitive to theα-value,but the phase speeds of propagating MJOs are not.Overall,with an increasingα-value,the simulated MJO-filtered OLR intensity increases,and the simulated propagation pattern is improved.Results also show that the intensity and propagation pattern of an eastward-propagating MJO are associated with MJO circulation structures and thermodynamic structures.Asαincreases,the front Walker cell and the low-level easterly anomaly are enhanced,which premoistens the lower troposphere and triggers more active shallow and congestus clouds.The enhanced shallow and congestus convection preconditions the lower to middle troposphere,accelerating the transition from congestus to deep convection,thereby facilitating eastward propagation of the MJO.Therefore,the simulated MJO tends to transfer from standing to eastward propagating asαincreases.In summary,increasing theα-value is a possible way to improve the simulation of the structure and propagation of the MJO.展开更多
Multiple quantum well(MQW) Ⅲ-nitride diodes that can simultaneously emit and detect light feature an overlapping region between their electroluminescence and responsivity spectra, which allows them to be simultaneous...Multiple quantum well(MQW) Ⅲ-nitride diodes that can simultaneously emit and detect light feature an overlapping region between their electroluminescence and responsivity spectra, which allows them to be simultaneously used as both a transmitter and a receiver in a wireless light communication system. Here, we demonstrate a mobile light communication system using a time-division multiplexing(TDM) scheme to achieve bidirectional data transmission via the same optical channel.Two identical blue MQW diodes are defined by software as a transmitter or a receiver. To address the light alignment issue, an image identification module integrated with a gimbal stabilizer is used to automatically detect the locations of moving targets;thus, underwater audio communication is realized via a mobile blue-light TDM communication mode. This approach not only uses a single link but also integrates mobile nodes in a practical network.展开更多
It is a challenging task to efficiently convert deleterious hydrogen sulfide(H_(2)S)into less harmful products such as SO_(4)^(2-)species.In an effort to address such issue,a step-scheme(S-scheme)heterojunction photoc...It is a challenging task to efficiently convert deleterious hydrogen sulfide(H_(2)S)into less harmful products such as SO_(4)^(2-)species.In an effort to address such issue,a step-scheme(S-scheme)heterojunction photocatalyst has been built by concatenating TiO_(2)(P25)and ultrathin Bi_(4)O_(5)Br_(2)into TiO_(2)/Bi_(4)O_(5)Br_(2)(namely,x-TB-y:x and y denote the molar ratio of TiO_(2):Bi_(4)O_(5)Br_(2)and pH value for solution-based synthesis,respectively)via in-situ hydrothermal method.The S-scheme charge transfer pathway in TB is confirmed by electron spin resonance and band structure analysis while experimental data and density functional theory calculations suggest the formation of an internal electric field to facilitate the separation and transfer of photoinduced charge carriers.Accordingly,the optimized heterojunction photocatalyst,i.e.,5-TB-9,showcases significantly high(>99%)removal efficiency against 10 ppm H_(2)S in a 17 L chamber within 12 minutes(removal kinetic rate r:0.7 mmol·h^(-1)·g^(-1),specific clean air delivery rate SCADR:5554 L·h^(-1)·g^(-1),quantum yield QY:3.24 E-3 molecules·photon^(-1),and space-time yield STY:3.24 E-3 molecules·photon^(-1)·mg^(-1)).Combined analysis of in-situ diffuse reflectance infrared Fourier transform adsorption spectra and gas chromatography-mass spectrometry allows to evaluate the mechanisms leading to the complete degradation of H_(2)S(i.e.,into SO_(4)^(2-)without forming any intermediate species).This work demonstrates the promising remediation potential of an S-scheme TiO_(2)/Bi_(4)O_(5)Br_(2)photocatalyst against hazardous H_(2)S gas for sustainable environmental remediation.展开更多
The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untru...The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time.展开更多
An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-t...An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-trusted,it should place as little trust as necessary to allow it to perform the translations.In some applications such as distributed file system,it demands the adversary cannot identify the sender and recipient’s identities.However,none of the exiting IB-PRE schemes satisfy this requirement.In this work,we first define the security model of key-private IB-PRE.Finally,we propose the first key-private IB-PRE scheme.Our scheme is chosen plaintext secure(CPA)and collusion resistant in the standard model.展开更多
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ...The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH).展开更多
With the diversification of electronic devices,cloud-based services have become the link between different devices.As a cryptosystem with secure conversion function,proxy re-encryption enables secure sharing of data i...With the diversification of electronic devices,cloud-based services have become the link between different devices.As a cryptosystem with secure conversion function,proxy re-encryption enables secure sharing of data in a cloud environment.Proxy re-encryption is a public key encryption system with ciphertext security conversion function.A semi-trusted agent plays the role of ciphertext conversion,which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key.Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al.[Blaze,Bleumer and Strauss(1998)].After 20 years of development,proxy re-encryption has evolved into many forms been widely used.This paper elaborates on the definition,characteristics and development status of proxy re-encryption,and classifies proxy re-encryption from the perspectives of user identity,conversion condition,conversion hop count and conversion direction.The aspects of the existing program were compared and briefly reviewed from the aspects of features,performance,and security.Finally,this paper looks forward to the possible development direction of proxy re-encryption in the future.展开更多
Wireless sensor networks(WSNs)have become increasingly popular due to the rapid growth of the Internet of Things.As open wireless transmission media are easy to attack,security is one of the primary design concerns fo...Wireless sensor networks(WSNs)have become increasingly popular due to the rapid growth of the Internet of Things.As open wireless transmission media are easy to attack,security is one of the primary design concerns for WSNs.Current solutions consider routing and data encryption as two isolated issues,providing incomplete security.Therefore,in this paper,we divide the WSN communication process into a data path selection phase and a data encryption phase.We propose an improved transmission method based on ant colony optimization(ACO)and threshold proxy re-encryption for WSNs,and we named it as ACOTPRE.The method resists internal and external attacks and ensures safe and efficient data transmission.In the data path selection stage,the ACO algorithm is used for network routing.The improvement of the pheromone concentration is proposed.In order to resist attacks from external attackers,proxy re-encryption is extended to WSN in the data encryption stage.The threshold secret sharing algorithm is introduced to generate a set of re-encryption key fragments composed of random numbers at the source node.We confirm the performance of our model via simulation studies.展开更多
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi...This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.展开更多
Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do ...Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do not involve any special data structure,and do not induce savings in memory requirements,they are easily implemented on existing codes and are recommended for 1D and 2D simulations when intensive testing is required.The multilevel technique can also be applied to balance laws,but in this case,numerical errors may be induced by the technique.We present a series of numerical tests that point out that the use of monotonicity-preserving interpolatory techniques eliminates the numerical errors observed when using the usual 4-point centered Lagrange interpolation,and leads to a more robust multilevel code for balance laws,while maintaining the efficiency rates observed forhyperbolic conservation laws.展开更多
基金The project is provided funding by the Natural Science Foundation of China(Nos.62272124,2022YFB2701400)the Science and Technology Program of Guizhou Province(No.[2020]5017)+3 种基金the Research Project of Guizhou University for Talent Introduction(No.[2020]61)the Cultivation Project of Guizhou University(No.[2019]56)the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education,GZUAMT2021KF[01]the Postgraduate Innovation Program in Guizhou Province(No.YJSKYJJ[2021]028).
文摘Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure.
基金supported by National Key Research and Development Project(No.2020YFB1005500)Beijing Natural Science Foundation Project(No.M21034)。
文摘With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost.
基金the Natural Science Foundation of Shandong Province (Y2007G37)the Science and Technology Development Program of Shandong Province (2007GG10001012)
文摘In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme.
基金supported,in part,by the National Nature Science Foundation of China under grant numbers 61502240,61502096,61304205,61773219in part,by the Natural Science Foundation of Jiangsu Province under Grant Numbers BK20191401。
文摘In sensor networks,it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys.In order to solve this problem,the present study proposes a scheme called multi-conditional proxy broadcast re-encryption(MC-PBRE).The scheme consists of the following roles:the source node,proxy server,and the target node.If the condition is met,the proxy can convert the encrypted data of the source node into data that the target node can directly decrypt.It allows the proxy server to convert the ciphertext of the source node to a new ciphertext of the target node in a different group,while the proxy server does not need to store the key or reveal the plaintext.At the same time,the proxy server cannot obtain any valuable information in the ciphertext.This paper formalizes the concept of MC-PBRE and its security model,and proposes a MC-PBRE scheme of ciphertext security.Finally,the scheme security has been proved in the random oracle.
基金Project supported by the National Natural Science Foundation of China(Nos.U1636114,61572521,and 61772550)the Innovative Research Team in Engineering University of People’s Armed Police,China(No.KYTD201805)+1 种基金the Natural Science Foundation of Shaanxi Province,China(No.2021JM-252)the Basic Research Project of Engineering University of People’s Armed Police,China(No.WJY201914)。
文摘Threshold proxy re-encryption(TPRE)can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies,and can also provide normal services even when certain proxy servers are paralyzed or damaged.A non-interactive identity-based TPRE(IB-TPRE)scheme over lattices is proposed which removes the public key certificates.To accomplish this scheme,Shamir’s secret sharing is employed twice,which not only effectively hides the delegator’s private key information,but also decentralizes the proxy power by splitting the re-encryption key.Robustness means that a combiner can detect a misbehaving proxy server that has sent an invalid transformed ciphertext share.This property is achieved by lattice-based fully homomorphic signatures.As a result,the whole scheme is thoroughly capable of resisting quantum attacks even when they are available.The security of the proposed scheme is based on the decisional learning with error hardness assumption in the standard model.Two typical application scenarios,including a file-sharing system based on a blockchain network and a robust key escrow system with threshold cryptography,are presented.
基金the National Natural Science Foundation of China(No.61133014)
文摘In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography.
基金This work is supported by“13th Five-Year”National Crypto Development Fund(No.MMJJ20170122)Zhejiang Provincial Natural Science Foundation of China(No.Y15F020053)+1 种基金the Project of Education Department of Henan Province(No.18A413001,No.16A520013)Natural Science Foundation of Henan Polytechnic University(No.T2018-1).
文摘With the widespread use of cloud computing technology,more and more users and enterprises decide to store their data in a cloud server by outsourcing.However,these huge amounts of data may contain personal privacy,business secrets and other sensitive information of the users and enterprises.Thus,at present,how to protect,retrieve,and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment.A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server.In this scheme,the user data are divided into files,file indexes and the keyword corresponding to the files,which are respectively encrypted to store.The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes,but re-encrypt the cipher-text of keywords corresponding to the files.Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack.And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption.Furthermore,the scheme does not need to use any secure channels,making it more effective in the cloud environment.
文摘ADER-WAF methods were first introduced by researchers E.F. Toro and V.A. Titarev. The linear stability criterion for the model equation for the ADER-WAF schemes is CCFL≤1, where CCFLdenotes the Courant-Friedrichs-Lewy (CFL) coefficient. Toro and Titarev employed CCFL=0.95for their experiments. Nonetheless, we noted that the experiments conducted in this study with CCFL=0.95produced solutions exhibiting spurious oscillations, particularly in the high-order ADER-WAF schemes. The homogeneous one-dimensional (1D) non-linear Shallow Water Equations (SWEs) are the subject of these experiments, specifically the solution of the Riemann Problem (RP) associated with the SWEs. The investigation was conducted on four test problems to evaluate the ADER-WAF schemes of second, third, fourth, and fifth order of accuracy. Each test problem constitutes a RP characterized by different wave patterns in its solution. This research has two primary objectives. We begin by illustrating the procedure for implementing the ADER-WAF schemes for the SWEs, providing the required relations. Afterward, following comprehensive testing, we present the range for the CFL coefficient for each test that yields solutions with diminished or eliminated spurious oscillations.
文摘Precise and accurate rainfall simulation is essential for Tanzania, where complex topography and diverse climatic influences result in variable precipitation patterns. In this study, the 31st October 2023 to 02nd November 2023 daily observation rainfall was used to assess the performance of 5 land surface models (LSMs) and 7 microphysics schemes (MPs) using the Weather Research and Forecasting (WRF) model. The 35 different simulations were then evaluated using the observation data from the ground stations (OBS) and the gridded satellite (CHIRPS) dataset. It was found that the WSM6 scheme performed better than other MPs even though the performance of the LSMs was dependent on the observation data used. The CLM4 performed better than others when the simulations were compared with OBS whereas the 5 Layer Slab produced the lowest mean absolute error (MAE) and root mean square error (RMSE) values while the Noah-MP and RUC schemes produced the lowest average values of RMSE and MAE respectively when the CHIRPS dataset was used. The difference in performance of land surface models when compared to different sets of observation data was attributed to the fact that each observation dataset had a different number of points over the same area, influencing their performances. Furthermore, it was revealed that the CLM4-WSM6 combination performed better than others in the simulation of this event when it was compared against OBS while the 5 Layer Slab-WSM6 combination performed well when the CHIRPS dataset was used for comparison. This research highlights the critical role of the selection of land surface models and microphysics schemes in forecasting extreme rainfall events and underscores the importance of integrating different observational data for model validation. These findings contribute to improving predictive capabilities for extreme rainfall events in similar climatic regions.
基金supported by the Henan Key Laboratory of Network Cryptography Technology(LNCT2022-A11)the Shaanxi Key Laboratory of Information Communication Network and Security(ICNS202006)。
文摘Proxy re-encryption(PRE)allows users to transfer decryption rights to the data requester via proxy.Due to the current PRE schemes from lattice(LPRE)cannot fulfill chosen-ciphertext attack(CCA)security,an identity-based PRE(IB-PRE)scheme from learning with errors over ring(RLWE)assumption with ciphertext evolution(IB-LPRE-CE)was proposed.IB-LPRE-CE generates the private key using the preimage sampling algorithm(SamplePre)and completes the ciphertext delegation using the re-encryption algorithm.In addition,for the problem of ciphertext delegation change caused by the long-term secret key update,the idea of PRE is used to complete ciphertext evolution and the modification of ciphertext delegation,which improves the efficiency of secure data sharing.In terms of security,IB-LPRE-CE is CCA security based on RLWE assumption.Compared with the current LPRE schemes,IB-LPRE-CE offers greater security and improves the computational efficiency of the encryption algorithm.
基金supported by the National Natural Science Foundation of China(Grant Nos.41975090,U2242201,42075077)the Natural Science Foundation of Hunan Province,China(2022JJ20043)the Science and Technology Innovation Program of Hunan Province,China(2022RC1239)。
文摘In this study,the Betts-Miller-Janjic(BMJ)convective adjustment scheme in the Weather Research and Forecasting(WRF)model version 4.0 was used to investigate the effect of itsα-parameter,which influences the first-guess potential temperature reference profile on the Madden-Julian oscillation(MJO)propagation and structure.This study diagnosed the MJO active phase composites of the MJO-filtered outgoing longwave radiation(OLR)during the December-to-February(DJF)period of 2006-2016 over the Indian Ocean(IO),Maritime Continent(MC),and western Pacific(WP).The results show that the MJO-filtered OLR intensity,propagation pattern,and MJO classification(standing,jumping,and propagating clusters)are sensitive to theα-value,but the phase speeds of propagating MJOs are not.Overall,with an increasingα-value,the simulated MJO-filtered OLR intensity increases,and the simulated propagation pattern is improved.Results also show that the intensity and propagation pattern of an eastward-propagating MJO are associated with MJO circulation structures and thermodynamic structures.Asαincreases,the front Walker cell and the low-level easterly anomaly are enhanced,which premoistens the lower troposphere and triggers more active shallow and congestus clouds.The enhanced shallow and congestus convection preconditions the lower to middle troposphere,accelerating the transition from congestus to deep convection,thereby facilitating eastward propagation of the MJO.Therefore,the simulated MJO tends to transfer from standing to eastward propagating asαincreases.In summary,increasing theα-value is a possible way to improve the simulation of the structure and propagation of the MJO.
基金jointly supported by the National Natural Science Foundation of China (U21A20495)Natural Science Foundation of Jiangsu Province (BG2024023)+1 种基金National Key Research and Development Program of China (2022YFE0112000)111 Project (D17018)。
文摘Multiple quantum well(MQW) Ⅲ-nitride diodes that can simultaneously emit and detect light feature an overlapping region between their electroluminescence and responsivity spectra, which allows them to be simultaneously used as both a transmitter and a receiver in a wireless light communication system. Here, we demonstrate a mobile light communication system using a time-division multiplexing(TDM) scheme to achieve bidirectional data transmission via the same optical channel.Two identical blue MQW diodes are defined by software as a transmitter or a receiver. To address the light alignment issue, an image identification module integrated with a gimbal stabilizer is used to automatically detect the locations of moving targets;thus, underwater audio communication is realized via a mobile blue-light TDM communication mode. This approach not only uses a single link but also integrates mobile nodes in a practical network.
文摘It is a challenging task to efficiently convert deleterious hydrogen sulfide(H_(2)S)into less harmful products such as SO_(4)^(2-)species.In an effort to address such issue,a step-scheme(S-scheme)heterojunction photocatalyst has been built by concatenating TiO_(2)(P25)and ultrathin Bi_(4)O_(5)Br_(2)into TiO_(2)/Bi_(4)O_(5)Br_(2)(namely,x-TB-y:x and y denote the molar ratio of TiO_(2):Bi_(4)O_(5)Br_(2)and pH value for solution-based synthesis,respectively)via in-situ hydrothermal method.The S-scheme charge transfer pathway in TB is confirmed by electron spin resonance and band structure analysis while experimental data and density functional theory calculations suggest the formation of an internal electric field to facilitate the separation and transfer of photoinduced charge carriers.Accordingly,the optimized heterojunction photocatalyst,i.e.,5-TB-9,showcases significantly high(>99%)removal efficiency against 10 ppm H_(2)S in a 17 L chamber within 12 minutes(removal kinetic rate r:0.7 mmol·h^(-1)·g^(-1),specific clean air delivery rate SCADR:5554 L·h^(-1)·g^(-1),quantum yield QY:3.24 E-3 molecules·photon^(-1),and space-time yield STY:3.24 E-3 molecules·photon^(-1)·mg^(-1)).Combined analysis of in-situ diffuse reflectance infrared Fourier transform adsorption spectra and gas chromatography-mass spectrometry allows to evaluate the mechanisms leading to the complete degradation of H_(2)S(i.e.,into SO_(4)^(2-)without forming any intermediate species).This work demonstrates the promising remediation potential of an S-scheme TiO_(2)/Bi_(4)O_(5)Br_(2)photocatalyst against hazardous H_(2)S gas for sustainable environmental remediation.
基金Projects(61472192,61202004)supported by the National Natural Science Foundation of ChinaProject(14KJB520014)supported by the Natural Science Fund of Higher Education of Jiangsu Province,China
文摘The cloud storage service cannot be completely trusted because of the separation of data management and ownership, leading to the difficulty of data privacy protection. In order to protect the privacy of data on untrusted servers of cloud storage, a novel multi-authority access control scheme without a trustworthy central authority has been proposed based on CP-ABE for cloud storage systems, called non-centered multi-authority proxy re-encryption based on the cipher-text policy attribute-based encryption(NC-MACPABE). NC-MACPABE optimizes the weighted access structure(WAS) allowing different levels of operation on the same file in cloud storage system. The concept of identity dyeing is introduced to improve the users' information privacy further. The re-encryption algorithm is improved in the scheme so that the data owner can revoke user's access right in a more flexible way. The scheme is proved to be secure. And the experimental results also show that removing the central authority can resolve the existing performance bottleneck in the multi-authority architecture with a central authority, which significantly improves user experience when a large number of users apply for accesses to the cloud storage system at the same time.
基金This work is supported by the National Natural Science Foundation of China(Nos.61702236,61672270,61602216,61872181)Changzhou Sci&Tech Program(Grant No.CJ20179027).
文摘An identity-based proxy re-encryption scheme(IB-PRE)allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message.Due to the fact that the proxy was semi-trusted,it should place as little trust as necessary to allow it to perform the translations.In some applications such as distributed file system,it demands the adversary cannot identify the sender and recipient’s identities.However,none of the exiting IB-PRE schemes satisfy this requirement.In this work,we first define the security model of key-private IB-PRE.Finally,we propose the first key-private IB-PRE scheme.Our scheme is chosen plaintext secure(CPA)and collusion resistant in the standard model.
基金supported by the National Natural Science Foundation of China(6120200461472192)+1 种基金the Special Fund for Fast Sharing of Science Paper in Net Era by CSTD(2013116)the Natural Science Fund of Higher Education of Jiangsu Province(14KJB520014)
文摘The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH).
基金This work is supported by the NSFC(Nos.61772280,61702236)the Changzhou Sci&Tech Program(No.CJ20179027),and the PAPD fund from NUIST.Prof.
文摘With the diversification of electronic devices,cloud-based services have become the link between different devices.As a cryptosystem with secure conversion function,proxy re-encryption enables secure sharing of data in a cloud environment.Proxy re-encryption is a public key encryption system with ciphertext security conversion function.A semi-trusted agent plays the role of ciphertext conversion,which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key.Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al.[Blaze,Bleumer and Strauss(1998)].After 20 years of development,proxy re-encryption has evolved into many forms been widely used.This paper elaborates on the definition,characteristics and development status of proxy re-encryption,and classifies proxy re-encryption from the perspectives of user identity,conversion condition,conversion hop count and conversion direction.The aspects of the existing program were compared and briefly reviewed from the aspects of features,performance,and security.Finally,this paper looks forward to the possible development direction of proxy re-encryption in the future.
基金This work was supported in part by Beijing Municipal Natural Science Foundation(19L2020)National Key Research and Development Project(Key Technologies and Applications of Security and Trusted Industrial Control System NO.2020YFB2009500).
文摘Wireless sensor networks(WSNs)have become increasingly popular due to the rapid growth of the Internet of Things.As open wireless transmission media are easy to attack,security is one of the primary design concerns for WSNs.Current solutions consider routing and data encryption as two isolated issues,providing incomplete security.Therefore,in this paper,we divide the WSN communication process into a data path selection phase and a data encryption phase.We propose an improved transmission method based on ant colony optimization(ACO)and threshold proxy re-encryption for WSNs,and we named it as ACOTPRE.The method resists internal and external attacks and ensures safe and efficient data transmission.In the data path selection stage,the ACO algorithm is used for network routing.The improvement of the pheromone concentration is proposed.In order to resist attacks from external attackers,proxy re-encryption is extended to WSN in the data encryption stage.The threshold secret sharing algorithm is introduced to generate a set of re-encryption key fragments composed of random numbers at the source node.We confirm the performance of our model via simulation studies.
基金the support of Prince Sultan University for paying the article processing charges(APC)of this publication.
文摘This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters.
基金supported by Grant PID2020-117211GB-I00funded by MCIN/AEI/10.13039/501100011033+4 种基金by Grant CIAICO/2021/227funded by the Generalitat Valencianasupported by the Ministerio de Ciencia e Innovacion of Spain(Grant Ref.PID2021-125709OB-C21)funded by MCIN/AEI/10.13039/501100011033/FEDER,UEby the Generalitat Valenciana(CIAICO/2021/224).
文摘Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do not involve any special data structure,and do not induce savings in memory requirements,they are easily implemented on existing codes and are recommended for 1D and 2D simulations when intensive testing is required.The multilevel technique can also be applied to balance laws,but in this case,numerical errors may be induced by the technique.We present a series of numerical tests that point out that the use of monotonicity-preserving interpolatory techniques eliminates the numerical errors observed when using the usual 4-point centered Lagrange interpolation,and leads to a more robust multilevel code for balance laws,while maintaining the efficiency rates observed forhyperbolic conservation laws.