Attribute-based signature (ABS) is a promising cryptographic primitive. It allows the signer to generate a signature with attributes satisfying the predicate without leaking more information, so as to provide message authenticity in an anonymous manner. However, drawbacks concerning security and efficiency hinder its applications for authentication in mobile platforms. Here, we present F2P-ABS, an escrow-free and pairing-free attribute-based signature supporting perfect signer privacy for mobile anonymous authentication. To enhance its adaptiveness to mobile platforms, a novel key extraction is proposed so that the key escrow problem is mitigated over the single authority setting. It also helps to remarkably reduce the size of the signing key. Different from existing schemes, F2P-ABS is free from pairing operations. It performs no pairing operation for verification. Without the loss of security, we prove that F2P-ABS achieves signer privacy in perfect sense. It is also proven to guarantee existential unforgeability under corrupted and adaptive chosen predicate and message attack, which is securer than existing schemes.
Three new sorbicillinoids, including trimer trisorbicillinone E (1), acremosorbicillinoids A and B (2 and 3), and a new alkaloid acremokaloid A (4), and a new natural product 2S,3S-acetyl-β-methyltryptophan (5), were isolated from an endophytic fungus Acremonium citrinum SS-g13, which is found in Fructus mori plant root. In addition, eight known sorbicillinoids (6–13) were also obtained. The new compound structures were established using NMR, HRESIMS spectra, and reported spectroscopic data. The absolute configurations of compounds 1–5, were determined by spectroscopic analysis, Snatzke’s method, and time-dependent density functional theory-electronic circular dichroism (TDDFT-ECD) calculations. Compound 11 exhibited significant cholesterol efflux enhancing activity. A plausible biosynthesis pathway for the sorbicillinoids is discussed.
The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.
Mobile devices now serve to pay for goods and services by means of the transmission of data, a system known as mobile payments. Mobile payment is receiving growing attention globally, from consumers to merchants, as an alternative to using cash, check, or credit cards. Most encryption techniques applied in mobile payment are based on traditional public key infrastructure. However, the traditional public key encryption algorithm has higher requirements for hardware, which is not suitable for mobile terminals of limited computing resources. In addition, these public key encryption algorithms are vulnerable to quantum computing attacks and the availability of practical quantum computer is approaching faster than previously believed. Since mobile payment is facing more and more security issues, how to complete the payment process effectively and securely becomes a problem urgently to be solved. In this paper, we firstly analyze the problem of the signature scheme for mobile payment and propose an improved signature scheme based on the Number Theory Research Unit (NTRU). The results of the experiment show that the proposed signature scheme is secure and efficient which can raise the speed and probability of generating reasonable signature value. Second, we introduce a new public key infrastructure NTRU-WPKI and design a third-party mobile payment model based on NTRU-WPKI to increase the efficiency and security. Finally, by doing the overall simulation, we prove that our model is highly effective and secure.INDEX TERMS Mobile payment, Number Theory Research Unit (NTRU), signature, wireless public key infrastructure (WPKI), quantum attacks.
Abstract. Data integrity verification is becoming a major challenge in cloud storage which can't be ignored. This paper proposes an optimized variant of CRC (Checker Redundancy Cyclic) verification algorithm based on HDFS to improve the efficiency of data integrity verification in cloud storage through the research of CRC checksum algorithm and data integrity verification mechanism of HDFS. A new method is formulated to establish the deformational optimization and to accelerate the algorithm by researching characteristics of generating and checking the algorithm. Moreover, this method optimizes the code to improve the computational efficiency according to data integrity verification mechanism of HDFS. A data integrity verification system based on Hadoop is designed to verify proposed method. Experimental results demonstrate that proposed HDFS based CRC algorithm was able to improve the calculation efficiency and the utilization of system resource on the whole and outperformed well compared to existing models in terms of accuracy and time.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.