Resource Type

Journal Article 11

Year

2023 1

2022 4

2021 1

2019 1

2018 1

2016 2

2000 1

open ︾

Keywords

Lattice 2

> existence theorem 1

Authority trust level 1

Backward unlikability 1

Certificateless multi-signature 1

Chameleon hash function 1

Digital signature 1

Double-authentication-preventing signatures 1

Group signature 1

Homomorphic hash function 1

Identity 1

Identity-based signature 1

Lattice-based cryptography 1

Linear combination 1

Network coding 1

Number theory research unit (NTRU) 1

P 1

Provable security 1

Random oracle model 1

Short integer solution 1

open ︾

Search scope:

排序: Display mode:

Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular

Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 2,   Pages 168-182 doi: 10.1007/s11705-021-2056-8

Abstract: different property prediction models consist different levels of structural information, molecular signature

Keywords: computer-aided molecular design     bio-oil additives     molecular signature descriptor    

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2,   Pages 135-142 doi: 10.1631/FITEE.1500197

Abstract:

Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.

Keywords: Identity     Signature     Lattice     Number theory research unit (NTRU)    

Certificateless broadcast multi-signature for network coding Research Article

Huifang YU, Zhewei QI

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1369-1377 doi: 10.1631/FITEE.2200271

Abstract: To solve these problems, the certificateless broadcast multi-signature for (NC-CLBMS) method is devised, where each source node user generates a multi-signature about the message vector, and the intermediateNC-CLBMS is a multi-source multi-signature method with anti-pollution and anti-forgery advantages; moreover, it has a fixed signature length and its computation efficiency is very high.

Keywords: Network coding     Certificateless multi-signature     Linear combination     Homomorphic hash function    

Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature

Frontiers of Medicine 2023, Volume 17, Issue 4,   Pages 768-780 doi: 10.1007/s11684-023-0982-1

Abstract: Previous studies have revealed that patients with hypertrophic cardiomyopathy (HCM) exhibit differences in symptom severity and prognosis, indicating potential HCM subtypes among these patients. Here, 793 patients with HCM were recruited at an average follow-up of 32.78 ± 27.58 months to identify potential HCM subtypes by performing consensus clustering on the basis of their echocardiography features. Furthermore, we proposed a systematic method for illustrating the relationship between the phenotype and genotype of each HCM subtype by using machine learning modeling and interactome network detection techniques based on whole-exome sequencing data. Another independent cohort that consisted of 414 patients with HCM was recruited to replicate the findings. Consequently, two subtypes characterized by different clinical outcomes were identified in HCM. Patients with subtype 2 presented asymmetric septal hypertrophy associated with a stable course, while those with subtype 1 displayed left ventricular systolic dysfunction and aggressive progression. Machine learning modeling based on personal whole-exome data identified 46 genes with mutation burden that could accurately predict subtype propensities. Furthermore, the patients in another cohort predicted as subtype 1 by the 46-gene model presented increased left ventricular end-diastolic diameter and reduced left ventricular ejection fraction. By employing echocardiography and genetic screening for the 46 genes, HCM can be classified into two subtypes with distinct clinical outcomes.

Keywords: machine learning methods     hypertrophic cardiomyopathy     genetic risk    

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2,   Pages 141-286 doi: 10.1631/FITEE.1900318

Abstract: With the rapid development of electronic information technology, digital signature has become an indispensableTo overcome this problem, we construct an IBS scheme on s by employing Lyubashevsky’s signature scheme

Keywords: Identity-based signature     Lattice     Strong unforgeability     Random oracle model    

Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome

Guangbiao Zhou, Xinchun Zhao

Frontiers of Medicine 2018, Volume 12, Issue 2,   Pages 236-238 doi: 10.1007/s11684-017-0611-y

Abstract:

Recently, Ng . reported that the A:T>T:A substitutions, proposed to be a signature of aristolochicchloride and its reactive metabolites chloroethylene oxide, melphalan and chlorambucil, also cause this signature

Keywords: genomic signature     carcinogen     aristolochic acid     tobacco smoke     vinyl chloride     hepatocellular carcinoma    

Current Status and Future Development of Quantum Cryptographic Protocols

Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping

Strategic Study of CAE 2022, Volume 24, Issue 4,   Pages 145-155 doi: 10.15302/J-SSCAE-2022.04.015

Abstract: In the future, practical quantum protocols for digital signature and two-party secure computation areprotocol" outline_type="title" type="outline">《6 Quantum digital signature protocol》

signature of quantum messages is not feasible even, which is different from the practical application of a digital signature.Therefore, it may be possible to design a quantum digital signature protocol with practical potential

Keywords: quantum cryptography     protocols     quantum key distribution     quantum digital signature     quantum private    

Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020

Abstract:

This paper analyzes and sorts out the latest developments and typical applications of network electronic identity management in major countries and regions around the world, and discusses development trends in network identity management technology. It outlines network electronic identity management in China according to the 13th Five-Year Plan, including the development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system. Such a system can help to regulate the behavior of Internet users, fight against network crime, build network power, safeguard national security and cyberspace sovereignty, and protect the privacy of network users; thus, it provides a reference for China’s network identity management development during the 13th Five-Year Plan.

Keywords: network electronic identity     identity management     digital signature    

The Generating Lock P<G,X,X'>and Its Central Encrypting System

Shi Kaiquan,Chen Zexiong

Strategic Study of CAE 2000, Volume 2, Issue 2,   Pages 41-46

Abstract:

The conception of the generating lock  P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XAXB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.

Keywords: encrypting system     multi-tooth encrypting-decrypting algorithm     P    X     X'     > existence theorem     digital signature    

Verifier-local revocation group signatures with backward unlinkability from lattices Research Articles

Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 6,   Pages 876-892 doi: 10.1631/FITEE.2000507

Abstract: flexible choice, because it requires only that verifiers download up-to-date revocation information for signature

Keywords: Group signature     Lattice-based cryptography     Verifier-local revocation     Backward unlikability     Short    

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash None

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 176-186 doi: 10.1631/FITEE.1700005

Abstract:

Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICSsignatures on two different messages with the same subject will result in an immediate collapse of the signature

Keywords: Double-authentication-preventing signatures     Chameleon hash function     Digital signature     Provable security    

Title Author Date Type Operation

Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular

Journal Article

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Journal Article

Certificateless broadcast multi-signature for network coding

Huifang YU, Zhewei QI

Journal Article

Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature

Journal Article

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Journal Article

Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome

Guangbiao Zhou, Xinchun Zhao

Journal Article

Current Status and Future Development of Quantum Cryptographic Protocols

Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping

Journal Article

Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Journal Article

The Generating Lock P<G,X,X'>and Its Central Encrypting System

Shi Kaiquan,Chen Zexiong

Journal Article

Verifier-local revocation group signatures with backward unlinkability from lattices

Yanhua ZHANG, Ximeng LIU, Yupu HU, Yong GAN, Huiwen JIA

Journal Article

Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash

Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG

Journal Article