57 resultados para ate pairing
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.
Resumo:
We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by \cite{lippold-ICISC_2009} in ICISC 2009 using the \cite{DBLP:conf/acisp/BoydCNP08} protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e$^2$CK model discussed by \cite{DBLP:conf/pairing/LippoldBN09}. The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.
Resumo:
DNA exists predominantly in a duplex form that is preserved via specific base pairing. This base pairing affords a considerable degree of protection against chemical or physical damage and preserves coding potential. However, there are many situations, e.g. during DNA damage and programmed cellular processes such as DNA replication and transcription, in which the DNA duplex is separated into two singlestranded DNA (ssDNA) strands. This ssDNA is vulnerable to attack by nucleases, binding by inappropriate proteins and chemical attack. It is very important to control the generation of ssDNA and protect it when it forms, and for this reason all cellular organisms and many viruses encode a ssDNA binding protein (SSB). All known SSBs use an oligosaccharide/oligonucleotide binding (OB)-fold domain for DNA binding. SSBs have multiple roles in binding and sequestering ssDNA, detecting DNA damage, stimulating strand-exchange proteins and helicases, and mediation of protein–protein interactions. Recently two additional human SSBs have been identified that are more closely related to bacterial and archaeal SSBs. Prior to this it was believed that replication protein A, RPA, was the only human equivalent of bacterial SSB. RPA is thought to be required for most aspects of DNA metabolism including DNA replication, recombination and repair. This review will discuss in further detail the biological pathways in which human SSBs function.
Resumo:
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz (Eurocrypt 2003), reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. The FS property was also shown to be achievable in (Hierarchical) Identity-Based Encryption (HIBE) by Yao, Fazio, Dodis, and Lysyanskaya (ACM CCS 2004). Yet, for emerging encryption techniques, offering flexible access control to encrypted data, by means of functional relationships between ciphertexts and decryption keys, FS protection was not known to exist.\smallskip In this paper we introduce FS to the powerful setting of \emph{Hierarchical Predicate Encryption (HPE)}, proposed by Okamoto and Takashima (Asiacrypt 2009). Anticipated applications of FS-HPE schemes can be found in searchable encryption and in fully private communication. Considering the dependencies amongst the concepts, our FS-HPE scheme implies forward-secure flavors of Predicate Encryption and (Hierarchical) Attribute-Based Encryption.\smallskip Our FS-HPE scheme guarantees forward security for plaintexts and for attributes that are hidden in HPE ciphertexts. It further allows delegation of decrypting abilities at any point in time, independent of FS time evolution. It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. As the ``cross-product" approach taken in FS-HIBE is not directly applicable to the HPE setting, our construction resorts to techniques that are specific to existing HPE schemes and extends them with what can be seen as a reminiscent of binary tree encryption from FS-PKE.
Resumo:
Laboratory-based studies of human dietary behaviour benefit from highly controlled conditions; however, this approach can lack ecological validity. Identifying a reliable method to capture and quantify natural dietary behaviours represents an important challenge for researchers. In this study, we scrutinised cafeteria-style meals in the ‘Restaurant of the Future.’ Self-selected meals were weighed and photographed, both before and after consumption. Using standard portions of the same foods, these images were independently coded to produce accurate and reliable estimates of (i) initial self-served portions, and (ii) food remaining at the end of the meal. Plate cleaning was extremely common; in 86% of meals at least 90% of self-selected calories were consumed. Males ate a greater proportion of their self-selected meals than did females. Finally, when participants visited the restaurant more than once, the correspondence between selected portions was better predicted by the weight of the meal than by its energy content. These findings illustrate the potential benefits of meal photography in this context. However, they also highlight significant limitations, in particular, the need to exclude large amounts of data when one food obscures another.
Resumo:
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.
Resumo:
Banana is a staple crop in many regions where vitamin A deficiency is prevalent, making it a target for provitamin A biofortification. However, matrix effects may limit provitamin A bioavailability from bananas. The retinol bioefficacies of unripe and ripe bananas (study 1A), unripe high-provitamin A bananas (study 1B), and raw and cooked bananas (study 2) were determined in retinol-depleted Mongolian gerbils (n = 97/study) using positive and negative controls. After feeding a retinol-deficient diet for 6 and 4 wk in studies 1 and 2, respectively, customized diets containing 60, 30, or 15% banana were fed for 17 and 13 d, respectively. In study 1A, the hepatic retinol of the 60% ripe Cavendish group (0.52 ± 0.13 μmol retinol/liver) differed from baseline (0.65 ± 0.15 μmol retinol/liver) and was higher than the negative control group (0.39 ± 0.16 μmol retinol/liver; P < 0.0065). In study 1B, no groups differed from baseline (0.65 ± 0.15 μmol retinol/liver; P = 0.20). In study 2, the 60% raw Butobe group (0.68 ± 0.17 μmol retinol/liver) differed from the 60% cooked Butobe group (0.87 ± 0.24 μmol retinol/liver); neither group differed from baseline (0.80 ± 0.27 μmol retinol/liver; P < 0.0001). Total liver retinol was higher in the groups fed cooked bananas than in those fed raw (P = 0.0027). Body weights did not differ even though gerbils ate more green, ripe, and raw bananas than cooked, suggesting a greater indigestible component. In conclusion, thermal processing, but not ripening, improves the retinol bioefficacy of bananas. Food matrix modification affects carotenoid bioavailability from provitamin A biofortification targets.
Resumo:
Complementary sequences at the 5′ and 3′ ends of the dengue virus RNA genome are essential for viral replication, and are believed to cyclise the genome through long-range base pairing in cis. Although consistent with evidence in the literature, this view neglects possible biologically active multimeric forms that are equally consistent with the data. Here, we propose alternative multimeric structures, and suggest that multigenome noncovalent concatemers are more likely to exist under cellular conditions than single cyclised monomers. Concatemers provide a plausible mechanism for the dengue virus to overcome the single-stranded (+)-sense RNA virus dilemma, and can potentially assist genome transport from the virus-induced vesicles into the cytosol.
Resumo:
In this study, a tandem LC-MS (Waters Xevo TQ) MRM-based MS method was developed for rapid, broad profiling of hydrophilic metabolites from biological samples, in either positive or negative ion modes without the need for an ion pairing reagent, using a reversed-phase pentafluorophenylpropyl (PFPP) column. The developed method was successfully applied to analyze various biological samples from C57BL/6 mice, including urine, duodenum, liver, plasma, kidney, heart, and skeletal muscle. As result, a total 112 of hydrophilic metabolites were detected within 8 min of running time to obtain a metabolite profile of the biological samples. The analysis of this number of hydrophilic metabolites is significantly faster than previous studies. Classification separation for metabolites from different tissues was globally analyzed by PCA, PLS-DA and HCA biostatistical methods. Overall, most of the hydrophilic metabolites were found to have a "fingerprint" characteristic of tissue dependency. In general, a higher level of most metabolites was found in urine, duodenum, and kidney. Altogether, these results suggest that this method has potential application for targeted metabolomic analyzes of hydrophilic metabolites in a wide ranges of biological samples.
Resumo:
Background and Objectives Obesity and some dietary related diseases are emerging health problems among Chinese immigrants and their children in developed countries. These health problems are closely linked to eating habits, which are established in the early years of life. Young children’s eating habits are likely to persist into later childhood and youth. Family environment and parental feeding practices have a strong effect on young children’s eating habits. Little information is available on the early feeding practices of Chinese mothers in Australia. The aim of this study was to understand the dietary beliefs, feeding attitudes and practices of Chinese mothers with young children who were recent immigrants to Australia. Methods Using a sequential explanatory design, this mixed methods study consisted of two distinct phases. Phase 1 (quantitative): 254 Chinese immigrant mothers of children aged 12 to 59 months completed a cross-sectional survey. The psychometric properties and factor structure of a Chinese version of the Child Feeding Questionnaire (CFQ, by Birch et al. 2001) were assessed and used to measure specific maternal feeding attitudes and controlling feeding practices. Other questions were developed from the literature and used to explore maternal traditional dietary beliefs and feeding practices related to their beliefs, perceptions of picky eating in children and a range of socioeconomic and acculturation factors. Phase 2 (qualitative): 21 mothers took part in a follow-up telephone interview to assist in explaining and interpreting some significant findings obtained in the first phase. Results Chinese mothers held strong traditional dietary beliefs and fed their children according to these beliefs. However, children’s consumption of non-core foods was high. Both traditional Chinese and Australian style foods were consumed by their children. Confirmatory factor analysis revealed that the original 7-factor model of the CFQ provided an acceptable fit to the data with minor modification. However, an alternative model with eight constructs in which two items related to using food rewards were separated from the original restriction construct, not only provided an acceptable fit to the data, but also improved the conceptual clarity of the constructs. The latter model included 24 items loading onto the following eight constructs: restriction, pressure to eat, monitoring, use of food rewards, perceived responsibility, perception of own weight, perception of child’s weight, and concern about child becoming overweight. The internal consistency of the constructs was acceptable or desirable (Cronbach’s α = .60 - .93). Mothers reported low levels of concern about their child overeating or becoming overweight, but high levels of controlling feeding practices: restriction, monitoring, pressure to eat and use of food rewards. More than one quarter of mothers misinterpreted their child’s weight status (based on mothers’ self-reported data). In addition, mothers’ controlling feeding practices independently predicted half of the variance and explained 16% of the variance in child weight status: pressuring the child to eat was negatively associated with child weight status (β = -0.30, p < .01) and using food rewards was positively associated with child weight status (β = 0.20, p < .05) after adjusting for maternal and child covariates. Monitoring and restriction were not associated with child weight status. Mothers’ perceptions of their child’s weight were positively associated with child weight status (β = 0.33, p < .01). Moreover, mothers reported that they mostly decided what (65%) and how much (80%) food their child ate. Mothers who decided what food their child ate were more likely to monitor (β = -0.17, p < .05) and restrict (β = -0.17, p < .05) their child’s food consumption. Mothers who let their child decide how much food their child ate were less likely to pressure their child to eat (β = -0.38, p < .01) and use food rewards (β = -0.24, p < .01). Mothers’ perceptions of picky eating behaviour were positively associated with their use of pressure (β = 0.21, p < .01) and negatively associated with monitoring (β = -0.16, p < .05) and perceptions of their child’s weight status (β = -0.13, p < .05). Qualitative data showed that pressuring to eat, monitoring and restriction of the child’s food consumption were common practices among these mothers. However, mothers stated that their motivation for monitoring and restricting was to ensure the child’s general health. Mothers’ understandings of picky eating behaviour in their children were consistent with the literature and they reported multiple feeding strategies to deal with it. Conclusion Chinese immigrant mothers demonstrated strong traditional dietary beliefs, a low level of concern for child weight, misperceptions of child weight status, and a high overall level of control in child feeding in this study. The Chinese version of the CFQ, which consists of eight constructs and distinguishes between the constructs using food rewards and restriction, is an appropriate instrument to assess feeding attitudes and controlling feeding practices among Chinese immigrant mothers of young children in Australia. Mothers’ feeding attitudes and practices were associated with children’s weight status and mothers’ perceptions of picky eating behaviour in children after adjusting for a range of socio-demographic maternal and child characteristics. Monitoring and restriction of children’s food consumption according to food selection may be positive feeding practices, whereas pressuring to eat and using food rewards appeared to be negative feeding practices in this study. In addition, the results suggest that these young children have high exposure to energy-dense, nutrient-poor food. There is a need to develop and implement nutrition interventions to improve maternal feeding practices and the dietary quality among children of Chinese immigrant mothers in Australia.
Resumo:
Background The role of fathers in shaping their child’s eating behaviour and weight status through their involvement in child feeding has rarely been studied. This study aims to describe the fathers’ perceived responsibility for child feeding, and to identify predictors of how frequently fathers eat meals with their child. Methods Four hundred and thirty-six Australian fathers (M age=37 years, SD=6 years; 34% university educated) of a 2-5 year old child (M age=3.5 years, SD=0.9 years; 53% boys) were recruited via contact with mothers enrolled in existing research projects or a University staff and student email list. Data were collected from fathers via a self-report questionnaire. Descriptive and hierarchical linear regression analyses were conducted. Results The majority of fathers reported that the family often/mostly ate meals together (79%). Many fathers perceived that they were responsible at least half of the time for feeding their child in terms of organizing meals (42%); amount offered (50%) and deciding if their child eats the ‘right kind of foods’ (60%). Time spent in paid employment was inversely associated with how frequently fathers ate meals with their child (β=-0.23, p<0.001); however, both higher perceived responsibility for child feeding (β=-0.16, p<0.004) and a more involved and positive attitude toward their role as a father (β=0.20, p<0.001) were positively related to how often they ate meals with their child, adjusting for a range of paternal and child covariates, including time spent in paid employment. Conclusions Fathers from a broad range of educational backgrounds appear willing to participate in research studies on child feeding. Most fathers were engaged and involved in family meals and child feeding. This suggests that fathers, like mothers, should be viewed as potential agents for the implementation of positive feeding practices within the family.
Resumo:
Maternal obesity, excess weight gain and lifestyle behaviours during pregnancy have been associated with future overweight and other adverse health outcomes for mothers and babies. This study compared the nutrition and physical activity behaviours of Australian healthy (BMI ≤ 25 k/m2) and overweight (BMI ≥ 25 kg/m2) pregnant women and described their knowledge and receipt of health professional advice early in pregnancy. Methods Pregnant women (n=58) aged 29±5 (mean±s.d.) years were recruited at 16±2 weeks gestation from an Australian metropolitan hospital. Height and weight were measured using standard procedures and women completed a self administered semi-quantitative survey. Results Healthy and overweight women had very similar levels of knowledge, behaviour and levels of advice provided except where specifically mentioned. Only 8% and 36% of participants knew the correct recommended daily number of fruit and vegetable serves respectively. Four percent of participants ate the recommended 5 serves/day of vegetables. Overweight women were less likely than healthy weight women to achieve the recommended fruit intake (4% vs. 8%, p=0.05), and more likely to consume soft drinks or cordial (55% vs 43%, p=0.005) and take away foods (37% vs. 25%, p=0.002) once a week or more. Less than half of all women achieved sufficient physical activity. Despite 80% of women saying they would have liked education about nutrition, physical activity and weight gain, particularly at the beginning of pregnancy, less than 50% were given appropriate advice regarding healthy eating and physical activity. Conclusion Healthy pregnancy behaviour recommendations were not being met, with overweight women less likely to meet some of the recommendations. Knowledge of dietary recommendations was poor and health care professional advice was limited. There are opportunities to improve the health care practices and education pregnant women received to improve knowledge and behaviours. Pregnant women appear to want this.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
Drosophila possesses the core gene silencing machinery but, like all insects, lacks the canonical RNA-dependent RNA polymerases (RdRps) that in C. elegans either trigger or enhance two major small RNA-dependent gene silencing pathways. Introduction of two different nematode RdRps into Drosophila showed them to be functional, resulting in differing silencing activities. While RRF-1 enhanced transitive dsRNA-dependent silencing, EGO-1 triggered dsRNA-independent silencing, specifically of transgenes. The strain w; da-Gal4; UAST-ego-1, constitutively expressing ego-1, is capable of silencing transgene including dsRNA hairpin upon a single cross, which created a powerful tool for research in Drosophila. In C. elegans, EGO-1 is involved in transcriptional gene silencing (TGS) of chromosome regions that are unpaired during meiosis. There was no opportunity for meiotic interactions involving EGO-1 in Drosophila that would explain the observed transgene silencing. Transgene DNA is, however, unpaired during the pairing of chromosomes in embryonic mitosis that is an unusual characteristic of Diptera, suggesting that in Drosophila, EGO-1 triggers transcriptional silencing of unpaired DNA during embryonic mitosis. © 2012 Springer Basel.
Resumo:
The Sessional Academic Success (SAS) project is a sustainable, distributed model for supporting sessional staff at QUT. Developed by the Learning and Teaching Unit. SAS complements our Sessional Academic Program (SAP): a sequence of formal academic development workshops explained in complementary nomination. SAS recognises that while these programs are very well received and a crucial aspect of preparing and advancing sessional teachers, they are necessarily encapsulated in the moment of their delivery and are generic, as they address all faculties (with their varied cultures, processes and pedagogies). The SAS project extends this formal, centrally offered activity into local, ‘just in time’, ongoing support within schools. It takes a distributed leadership approach. Experienced sessional academics are recruited and employed as Sessional Academic Success Advisors (SASAs). They provide sessional staff in their schools with contextually specific, needs based, peer-to-peer development opportunities; one-on-one advice on classroom management and strategies for success; and help to trouble-shoot challenges. The SASAs are trained by the Learning and Teaching Unit co-ordinator, and ongoing support is provided centrally and by school-based co-ordinators. This team approach situates the SASAs at the centre of an organisation map (see diagram of support relationships below). The SAS project aims to support sessional staff in their professional development by: • Offering contextual, needs-based support at school level by harnessing local expertise; • Providing further development opportunities that are local and focal; SAS aims to retain Sessional Staff by: • Responding to self-nominated requests for support and ‘just in time’, safe and reliable advice in times of need; • Building sessional staff confidence through help with dealing with challenges from a trusted peer; • Building a supportive academic community for sessional staff, which helps them feel a part of faculty life, and a community of teaching practice. SAS aims to support sessional staff in the development of academic teaching careers by: • Recognising the capacity of experienced sessional staff to support their peers in ways that are unique, valuable and valued and providing the agency to do so; • Providing career advancement and leadership opportunities for sessional staff. SAS takes unique approaches within each school using strategies such as: • Welcomes and schools orientation by SASAs; • Regular check ins; face-to-face advice and online support; • Compiling local resources to complement university wide resources. • Sessional-to-sessional ‘just in time’ training (eg. assessment and marking when marking commences); • Peer feedback and mentoring (the opportunities to sit in more experiences sessionals’ classes; • Sessional staff awards (nominated by students); • Communities of practice to discuss topics and issues with a view to (and support for) publishing on learning and teaching. In these ways, SASAs complement support offered by unit coordinators, administrators, and the Learning and Teaching Unit. Pairing senior and ‘understudy’ advisors ensures a line of succession, sustainability and continuity. A pilot program commenced in 2012 involving three schools (Psychology and Social Work; Electrical Engineering and Computer Science; Media, Entertainment and Creative Arts). It will be expanded across schools in 2013.