A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one parti...A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one participant to get the secret at any time, but these participants can get nothing about the secret before that moment. At the same time, the other participants cannot get anything about the secret by stealing the secret value when it is transferred. However, if the dealer is lost, a certain number or more partidtmnts of them can reoonstruct the secret by ccoperating. In order to clear this concept, an illustrating scheme with geometry method and a practical scheme with algebra method is given.展开更多
A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the trausaction receive each other's items or none d...A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the trausaction receive each other's items or none do. A non-interactive optimistic fair exchange e-commerce protocol model based on the publicly verifiable secret sharing is presented. The main idea of our exchange protocol is to interchange verifiable and recoverable keys of the symmetric encryption for participants' items. So it is especially suitable for exchange of large-size items. Furthermore, our protocol is efficient and simple as it does not need interactive proof system which has been adopted by a large quantity of previously proposed fair exchange protocols. Based on a modified (2,2) secret sharing scheme, a concrete non-interactive fair exchange e-commerce protocol is designed.展开更多
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu...Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance.展开更多
To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this schem...To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security.展开更多
The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptog...The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptographic computation. But the original scheme can easily be corrupted by malicious participant. We propose an extension of VSS(visual secret sharing) to identify cheaters before the secret is recovered. Without the need for any additional information and cryptographic computation, every participant can verify the validity of shares of other participants, thus the security of VSS is enhanced.展开更多
Through a detailed text examination,this paper contends that albeit Kate Grenville'sThe Secret River is dedicated to interrogate white actions in the colonial past and expects to contribute to the process of recon...Through a detailed text examination,this paper contends that albeit Kate Grenville'sThe Secret River is dedicated to interrogate white actions in the colonial past and expects to contribute to the process of reconciliation in Australia, it engages sympathy of readers through the empathetic personification of the protagonist William Thornhill,who is subtly positioned as a victim forced into morally dubious actions by extraordinary circumstances. The wrongdoing of the white settlers is normalized in a western conception of possessive logic,the plight of the Aborigines authentically diluted and minimized. This paper thus concludes that The Secret River is another white attempt to legitimize dispossession of the Indigenous and a failure of engagement in the national reconciliation process. This paper further points out that repressing the true history will never set Australia free; acknowledging collective guilt is the only way forward.展开更多
In this paper, the authortries to make a tentative analysis on the short story “The Secret Room” by Alain Robbe Grillet, a French novelist and a contemporary world famous experimentalist of “new novel” form, throu...In this paper, the authortries to make a tentative analysis on the short story “The Secret Room” by Alain Robbe Grillet, a French novelist and a contemporary world famous experimentalist of “new novel” form, through reading in phenomenological approach so as to appreciate his novel style, realize the readers esthetic imagination, meanwhile, to deepen the understanding of the process of phenomenological reading.展开更多
The objective of the study was to investigate the effects of dietary energy levels and sources on the blood metabolites,hormone secretion and the composition of follicular fluid in gilts.Fifty-four gilts with initial ...The objective of the study was to investigate the effects of dietary energy levels and sources on the blood metabolites,hormone secretion and the composition of follicular fluid in gilts.Fifty-four gilts with initial body weight of(59±4.2) kg were randomly allotted to six treatments.Treatments were low, normal,and high energy feeding levels,which were 87.5%,100%and 112.5%of recommendatory energy requirements by NRC(1998),respectively,and dietary energy sources(starch or fat).Blood samples and follicular fluids were collected on D18 and D19 of the second estrous cycle.The results showed that plasma concentrations of triglycerides and total cholesterol were higher in the fat group than that in the starch group(P【0.05),but those of glucose were similar between the two energy sources(P】0.05);dietary energy level exerted no effect on blood metabolites concentration(P】0.05).Gilts fed the high energy diet had a higher area under curve of plasma insulin(Insulin AUC),insulin-like growth factor-Ⅰ(IGF-Ⅰ) and leptin than did gilts fed the lower energy diet(P【0.05),but there was no significant difference between fat versus starch(P】0.05).Luteinizing hormone(LH) pulses were higher in gilts fed high energy rather than that in low energy diets(P】0.05),plasma concentration of estradiol(E<sub>2</sub>) was higher in the fat group than that in the starch group(P【0.05).The number of large follicles(diameter≥4 mm) and concentrations of IGF-Ⅰand E<sub>2</sub> in follicular fluid were increasing significant as the level of energy increased(P【0.05),but the numbers of large follicles and follicular fluid composition were not affected by the source of dietary energy(P】0.05).The results indicate that gilts fed high energy diets had elevated plasma concentrations of metabolic hormones,IGF-Ⅰand LH secretion,and increased follicular fluid concentrations of IGF-Ⅰ,E<sub>2</sub> and numbers of large follicles;gilts fed the dietary fat had a higher plasma concentration of cholesterol and E<sub>2</sub>.展开更多
A new threshold secret sharing scheme is constructed by introducing the concept of share vector, in which the number of shareholders can be adjusted by randomly changing the weights of them. This kind of scheme overco...A new threshold secret sharing scheme is constructed by introducing the concept of share vector, in which the number of shareholders can be adjusted by randomly changing the weights of them. This kind of scheme overcomes the limitation of the static weighted secret sharing schemes that cannot change the weights in the process of carrying out and the deficiency of low efficiency of the ordinary dynamic weighted sharing schemes for its resending process. Thus, this scheme is more suitable to the case that the number of shareholders needs to be changed randomly during the scheme is carrying out.展开更多
Aim To observe the effect of L-pantoprazole sodium on gastric acid secretion in rats. Methods The rats single injection to the drug on tail after fasting but help water 48h, then threading the pyloric ligation at the ...Aim To observe the effect of L-pantoprazole sodium on gastric acid secretion in rats. Methods The rats single injection to the drug on tail after fasting but help water 48h, then threading the pyloric ligation at the junction of the pylorus and duodenum, and the animals were fasted and ban water 5h. We remove the total gastrec- tomy, gastric juice was collected and the amount of the volume, and the determination of total acidity、total acidity secretion^pH value. Results L-pantoprazole sodium and pan pantoprazole sodium can significantly reduce the to- tal acidity secretion volume (P 〈 0.05), increased gastric pH (P 〈 0.01 ). D-pantoprazole sodium on gastric acid secretion of gastric juice and total PH had no significant effect ( P 〉 0. 05 ). Conclusion L-pantoprazole sodiumhas significant inhibition of gastric acid secretion, the mechanism of the treatment of peptic ulcer may be through inhibition of proton pump discharge acid effect, to play a role in the protection of gastric mucosa.展开更多
We have reported that the central mechanism of acupuncture-induced PRL secretion in non-lactating rats are related to antagonizing hypothalamic dopamine activity; noradrenaline system played little significant role in...We have reported that the central mechanism of acupuncture-induced PRL secretion in non-lactating rats are related to antagonizing hypothalamic dopamine activity; noradrenaline system played little significant role in the acupuncture effect; Υ-aminobutyric-acid system perhaps participated in this effect.This paper further provided evidence that central serotonin and EOP play a stimulatory role in the acupuncture induced secretion of prolactin; acupuncture may antagonize inhibitory effect of H<sub>2</sub> histamine receptor activation on prolactin secretion; the possible role of H<sub>1</sub>-receptor needs further investigation.展开更多
A series of highly taxonomically diverse Trichoderma strains were investigated using proteomic approaches, to investigate the utility of protein profiles as taxonomic markers and to identify proteins of potential econ...A series of highly taxonomically diverse Trichoderma strains were investigated using proteomic approaches, to investigate the utility of protein profiles as taxonomic markers and to identify proteins of potential economic importance. Initial studies have focused on a comparison of single strains of T. aureoviride, T. saturnisporum, T. polysporum, T. longbrachiatum and T. spirale, along with two strains of T. harzianum. All seven strains were grown in synthetic medium supplemented with 2%(w/v) glycerol, to maximize the diversity of extracellular protein production. Samples of secreted protein were separated by 2D gel electrophoresis and will be characterized by MALDI-TOF peptide fingerprinting.展开更多
针对现有用户协作算法存在共谋攻击、背景知识攻击以及用户协作意愿等问题,基于可验证秘密共享与智能合约提出了一种用户协作隐私保护算法(privacy protection algorithm based on verifiable secret sharing and smart contracts,VSS-S...针对现有用户协作算法存在共谋攻击、背景知识攻击以及用户协作意愿等问题,基于可验证秘密共享与智能合约提出了一种用户协作隐私保护算法(privacy protection algorithm based on verifiable secret sharing and smart contracts,VSS-SCPPA)。该算法首先利用可验证秘密共享算法对用户查询信息进行加密和分裂,并提供系数承诺以验证子秘密数据的完整性。其次,结合智能合约与差分隐私技术设计了一种用户选择算法,构建匿名集。对该算法在抵御串通攻击方面的有效性进行了分析。通过在Geolife与BerlinMOD数据集上的实验,结果显示VSS-SCPPA的隐私保护性更高。与Tr-privacy、Ik-anonymity和GCS相比,VSS-SCPPA的效率分别提高了约86.34%、99.27%和99.19%。VSS-SCPPA在提高隐私保护性的同时显著提升了算法效率,证明了其在用户协作隐私保护中的有效性。展开更多
基金This project was supported by Liuhui Applied Mathematics Center of Nankai University .
文摘A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one participant to get the secret at any time, but these participants can get nothing about the secret before that moment. At the same time, the other participants cannot get anything about the secret by stealing the secret value when it is transferred. However, if the dealer is lost, a certain number or more partidtmnts of them can reoonstruct the secret by ccoperating. In order to clear this concept, an illustrating scheme with geometry method and a practical scheme with algebra method is given.
基金This project was partially supported by the National Natural Science Foundation of China (60273049, 90104005).
文摘A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the trausaction receive each other's items or none do. A non-interactive optimistic fair exchange e-commerce protocol model based on the publicly verifiable secret sharing is presented. The main idea of our exchange protocol is to interchange verifiable and recoverable keys of the symmetric encryption for participants' items. So it is especially suitable for exchange of large-size items. Furthermore, our protocol is efficient and simple as it does not need interactive proof system which has been adopted by a large quantity of previously proposed fair exchange protocols. Based on a modified (2,2) secret sharing scheme, a concrete non-interactive fair exchange e-commerce protocol is designed.
基金supported by the National Basic Research Program of China(973 Program)(2011CB302903)the Key Program of Natural Science for Universities of Jiangsu Province(10KJA510035)+2 种基金the Science and Technology Innovation Group Foundation of Jiangsu Province ("Qing and Lan" Project)the Postgraduate Innovation Project Foundation of Jiangsu Province(CX10B 194ZCX09B 152Z)
文摘Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance.
基金This project was supported by Young Teacher Foundation of North China Elec. Power Univ.(200521001)
文摘To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security.
文摘The visual secret sharing scheme proposed by Naor and Shamir provides a way to encrypt a secret black-white image into shares. A qualified group of participants can recover the secret message without using any cryptographic computation. But the original scheme can easily be corrupted by malicious participant. We propose an extension of VSS(visual secret sharing) to identify cheaters before the secret is recovered. Without the need for any additional information and cryptographic computation, every participant can verify the validity of shares of other participants, thus the security of VSS is enhanced.
基金the National Social Science Fund Key Project--Oceania Literature Research in Multicultural Perspective(16ZDA200) the National Social Science Fund Project-A Critical History of Contemporary Australian Literature(12BWW037).
文摘Through a detailed text examination,this paper contends that albeit Kate Grenville'sThe Secret River is dedicated to interrogate white actions in the colonial past and expects to contribute to the process of reconciliation in Australia, it engages sympathy of readers through the empathetic personification of the protagonist William Thornhill,who is subtly positioned as a victim forced into morally dubious actions by extraordinary circumstances. The wrongdoing of the white settlers is normalized in a western conception of possessive logic,the plight of the Aborigines authentically diluted and minimized. This paper thus concludes that The Secret River is another white attempt to legitimize dispossession of the Indigenous and a failure of engagement in the national reconciliation process. This paper further points out that repressing the true history will never set Australia free; acknowledging collective guilt is the only way forward.
文摘In this paper, the authortries to make a tentative analysis on the short story “The Secret Room” by Alain Robbe Grillet, a French novelist and a contemporary world famous experimentalist of “new novel” form, through reading in phenomenological approach so as to appreciate his novel style, realize the readers esthetic imagination, meanwhile, to deepen the understanding of the process of phenomenological reading.
基金supported by Program for Changjiang Scholars and Innovative Research Team in University (IRT0555)National Natural Science Foundation (30471257) of China
文摘The objective of the study was to investigate the effects of dietary energy levels and sources on the blood metabolites,hormone secretion and the composition of follicular fluid in gilts.Fifty-four gilts with initial body weight of(59±4.2) kg were randomly allotted to six treatments.Treatments were low, normal,and high energy feeding levels,which were 87.5%,100%and 112.5%of recommendatory energy requirements by NRC(1998),respectively,and dietary energy sources(starch or fat).Blood samples and follicular fluids were collected on D18 and D19 of the second estrous cycle.The results showed that plasma concentrations of triglycerides and total cholesterol were higher in the fat group than that in the starch group(P【0.05),but those of glucose were similar between the two energy sources(P】0.05);dietary energy level exerted no effect on blood metabolites concentration(P】0.05).Gilts fed the high energy diet had a higher area under curve of plasma insulin(Insulin AUC),insulin-like growth factor-Ⅰ(IGF-Ⅰ) and leptin than did gilts fed the lower energy diet(P【0.05),but there was no significant difference between fat versus starch(P】0.05).Luteinizing hormone(LH) pulses were higher in gilts fed high energy rather than that in low energy diets(P】0.05),plasma concentration of estradiol(E<sub>2</sub>) was higher in the fat group than that in the starch group(P【0.05).The number of large follicles(diameter≥4 mm) and concentrations of IGF-Ⅰand E<sub>2</sub> in follicular fluid were increasing significant as the level of energy increased(P【0.05),but the numbers of large follicles and follicular fluid composition were not affected by the source of dietary energy(P】0.05).The results indicate that gilts fed high energy diets had elevated plasma concentrations of metabolic hormones,IGF-Ⅰand LH secretion,and increased follicular fluid concentrations of IGF-Ⅰ,E<sub>2</sub> and numbers of large follicles;gilts fed the dietary fat had a higher plasma concentration of cholesterol and E<sub>2</sub>.
基金supported by the National Preeminent Youth Foundation(70225002)the Doctor Foundation of North China Electric Power University(200822029).
文摘A new threshold secret sharing scheme is constructed by introducing the concept of share vector, in which the number of shareholders can be adjusted by randomly changing the weights of them. This kind of scheme overcomes the limitation of the static weighted secret sharing schemes that cannot change the weights in the process of carrying out and the deficiency of low efficiency of the ordinary dynamic weighted sharing schemes for its resending process. Thus, this scheme is more suitable to the case that the number of shareholders needs to be changed randomly during the scheme is carrying out.
文摘Aim To observe the effect of L-pantoprazole sodium on gastric acid secretion in rats. Methods The rats single injection to the drug on tail after fasting but help water 48h, then threading the pyloric ligation at the junction of the pylorus and duodenum, and the animals were fasted and ban water 5h. We remove the total gastrec- tomy, gastric juice was collected and the amount of the volume, and the determination of total acidity、total acidity secretion^pH value. Results L-pantoprazole sodium and pan pantoprazole sodium can significantly reduce the to- tal acidity secretion volume (P 〈 0.05), increased gastric pH (P 〈 0.01 ). D-pantoprazole sodium on gastric acid secretion of gastric juice and total PH had no significant effect ( P 〉 0. 05 ). Conclusion L-pantoprazole sodiumhas significant inhibition of gastric acid secretion, the mechanism of the treatment of peptic ulcer may be through inhibition of proton pump discharge acid effect, to play a role in the protection of gastric mucosa.
基金Project supported by the National Natural Science Fund
文摘We have reported that the central mechanism of acupuncture-induced PRL secretion in non-lactating rats are related to antagonizing hypothalamic dopamine activity; noradrenaline system played little significant role in the acupuncture effect; Υ-aminobutyric-acid system perhaps participated in this effect.This paper further provided evidence that central serotonin and EOP play a stimulatory role in the acupuncture induced secretion of prolactin; acupuncture may antagonize inhibitory effect of H<sub>2</sub> histamine receptor activation on prolactin secretion; the possible role of H<sub>1</sub>-receptor needs further investigation.
文摘A series of highly taxonomically diverse Trichoderma strains were investigated using proteomic approaches, to investigate the utility of protein profiles as taxonomic markers and to identify proteins of potential economic importance. Initial studies have focused on a comparison of single strains of T. aureoviride, T. saturnisporum, T. polysporum, T. longbrachiatum and T. spirale, along with two strains of T. harzianum. All seven strains were grown in synthetic medium supplemented with 2%(w/v) glycerol, to maximize the diversity of extracellular protein production. Samples of secreted protein were separated by 2D gel electrophoresis and will be characterized by MALDI-TOF peptide fingerprinting.
文摘针对现有用户协作算法存在共谋攻击、背景知识攻击以及用户协作意愿等问题,基于可验证秘密共享与智能合约提出了一种用户协作隐私保护算法(privacy protection algorithm based on verifiable secret sharing and smart contracts,VSS-SCPPA)。该算法首先利用可验证秘密共享算法对用户查询信息进行加密和分裂,并提供系数承诺以验证子秘密数据的完整性。其次,结合智能合约与差分隐私技术设计了一种用户选择算法,构建匿名集。对该算法在抵御串通攻击方面的有效性进行了分析。通过在Geolife与BerlinMOD数据集上的实验,结果显示VSS-SCPPA的隐私保护性更高。与Tr-privacy、Ik-anonymity和GCS相比,VSS-SCPPA的效率分别提高了约86.34%、99.27%和99.19%。VSS-SCPPA在提高隐私保护性的同时显著提升了算法效率,证明了其在用户协作隐私保护中的有效性。