27 resultados para Bilinear pairings.

em Deakin Research Online - Australia


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built from bilinear mappings on elliptic curves which need costly operations. Despite the investigation of certificateless public key encryption without pairings, certificateless signature without pairings received much less attention than what it deserves. In this paper, we present a concrete pairing-free certificateless signature scheme for the first time. Our scheme is more computationally efficient than others built from pairings. The new scheme is provably secure in the random oracle model assuming the hardness of discrete logarithm problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbitrary identity string as an encryption key. Since IBE does not require prior generation and distribution of keys, it greatly simplifies key management in public-key cryptography. According to the Menezes-Okamoto-Vanstone (MOV) reduction theory, the IBE scheme based on bilinear map loses the high efficiency of elliptic curve because of the requirement of large security parameters. Therefore, it is important to build a provably secure IBE scheme without bilinear map. To this end, this paper proposes an improved IBE scheme that is different from the previous schemes because this new scheme does not use symmetric encryption algorithm. Furthermore, it can be proven to be secure against adaptively chosen identity and chosen plaintext attacks in the standard model. Elaborated security and performance analysis demonstrate that this new scheme outperforms the previous ones in terms of the time complexity for encryption and decryption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There are many proposals for managing biodiversity by using surrogates, such as umbrella, indicator, focal, and flagship species. We use the term biodiversity management unit for any ecosystem-based classificatory scheme for managing biodiversity. The sufficiency of biodiversity management unit classification schemes depends upon (1) whether different biotic elements (e.g., trees, birds, reptiles) distinguish between biodiversity management units within a classification (i.e., coherence within classes}; and (2) whether different biotic elements agree upon similarities and dissimilarities among biodiversity management unit classes (i.e., conformance among classes). Recent evaluations suggest that biodiversity surrogates based on few or single taxa are not useful. Ecological vegetation classes are an ecosystem-based classification scheme used as one component for biodiversity management in Victoria, Australia. Here we evaluated the potential for ecological vegetation classes to be used as biodiversity management units in the box-ironbark ecosystem of central Victoria, Australia. Eighty sites distributed among 14 ecological vegetation classes were surveyed in the same ways for tree species, birds, mammals, reptiles, terrestrial invertebrates, and nocturnal flying insects. Habitat structure and geographic separations also were measured, which, with the biotic elements, are collectively referred to as variables. Less than half of the biotic element-ecological vegetation class pairings were coherent. Generalized Mantel tests were used to examine conformance among variables with respect to ecological vegetation classes. While most tests were not significant, birds, mammals, tree species, and habitat structure together showed significant agreement on the rating of similarities among ecological vegetation classes. In this system, use of ecological vegetation classes as biodiversity management units may account reasonably well for birds, mammals, and trees; but reptiles and invertebrates would not be accommodated. We conclude that surrogates will usually have to be augmented or developed as hierarchies to provide general representativeness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper considers the concept of congruity or 'fit' in a cause-related marketing (CRM) context. At present, there is a gap in the literature that explores how nonprofit-forprofit pairings affect a consumer's response to and evaluation of CRM campaigns. This paper develops the concept of 'fit' with particular attention being paid to three dimensions, namely, cognitive, emotional and behavioural congruity and the role these concepts play in determining consumers’ perception of the 'relatedness' of products and causes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

All four types of organizational justice – distributive, procedural, interpersonal and informational – were included in this study of gender differences. Both male and female respondents perceived the distributive-procedural justice and interpersonal-informational justice pairings similarly and weakly. Females consistently discriminated more clearly across the pairings, however. The effect of the four justices was also found to be gender-dependent. Males’ perception of distributive justice directly predicted their turnover intentions and commitment to the organization, while females’ perception of distributive justice predicted only job satisfaction. Males’ perceptions of procedural and information justice both predicted job satisfaction. Females’ informational justice perceptions predicted job satisfaction and commitment to the organization. The paper contributes to the literature by presenting results from all four justice types and the simultaneous use of the three outcomes of job satisfaction, organizational commitment and intention to quit. Overall, the males had a diffuse set of relationships between the justice types and the outcomes, whereas the relationships between the justice types and
the outcomes for females tended more to follow a limited number of pathways. The study was validated with data collected on two separate occasions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To assess the physico-chemical characteristics of protein-protein interactions, protein sequences and overall structural folds have been analyzed previously. To highlight this, discovery and examination of amino acid patterns at the binding sites defined by structural proximity in 3-dimensional (3D) space are essential. In this paper, we investigate the interacting preferences of 3D pattern pairs discovered separately in transient and obligate protein complexes. These 3D pattern pairs are not necessarily sequence-consecutive, but each residue in two groups of amino acids from two proteins in a complex is within certain °A threshold to most residues in the other group. We develop an algorithm called AA-pairs by which every pair of interacting proteins is represented as a bipartite graph, and it discovers all maximal quasi-bicliques from every bipartite graph to form our 3D pattern pairs. From 112 and 2533 highly conserved 3D pattern pairs discovered in the transient and obligate complexes respectively, we observe that Ala and Leu is the highest occuring amino acid in interacting 3D patterns of transient (20.91%) and obligate (33.82%) complexes respectively. From the study on the dipeptide composition on each side of interacting 3D pattern pairs, dipeptides Ala-Ala and Ala-Leu are popular in 3D patterns of both transient and obligate complexes. The interactions between amino acids with large hydrophobicity difference are present more in the transient than in the obligate complexes. On contrary, in obligate complexes, interactions between hydrophobic residues account for the top 5 most occuring amino acid pairings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study attempts to investigate the transmission of market-wide volatility between the equity markets and bond markets of Japan and the U.S. To measure the volatility transmission, the BEKK (Baba, Engle, Kraft and Kroner, 1990) method, a decomposition approach of the multivariate GARCH (1,1) model, is used to examine the cross-market contemporaneous effect of information arrival. The time series analysis provides evidence to the long-run phenomena of causality in conditional variances of paired assets within the local and international markets. Within various pairings, some evidence of bi-directional volatility transmissions such as informational linkages have been observed. Our empirical results suggest that within the domestic cross markets, the volatility transmission is unidirectional from the stock market to the bond market. Evidence from international cross-market analysis is mixed, with strong evidence on volatility spillover among these international stock markets, but weak evidence between international stock and bond markets. In addition, there are significant directional volatility transmissions between DJI index and FTSE100 index, and between DJI index and DAX200 index. The volatility transmission between these two markets indicates that the international diversification of bonds is not prevalent.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose. This non-dispensing cross-over study was conducted to determine if lenses presoaked in Opti-Free RepleniSH (OFR) or ReNu MultiPlus (RMP) cause solution-induced corneal staining (SICS) and subsequent cell sloughing before the typical 2 h in vivo examination point.

Methods. Study lenses (PureVision) were worn bilaterally by 13 participants for periods of 15, 30, 60, and 120 min using two different contralateral care regimen pairings. The lens worn on the test eye was soaked overnight in either OFR or RMP and the control eye in Clear Care (CC). After lens removal, corneal staining was rated on a scale of 0 (negligible) to 100 (severe) for four peripheral quadrants and the central region, and the differential global staining score was calculated by subtracting baseline staining scores. Following the staining assessment, corneal cells were collected from the ocular surface using a non-contact irrigation system to determine ocular cell shedding rates.

Results. Differential global staining score with OFR was greater than CC with the differences being statistically significant at 30 and 60 min (p < 0.01). Maximum staining with RMP was significantly greater than OFR and peaked after 60 and 120 min of lens wear (p < 0.01). On average, 710 ± 470 ocular cells were collected after lens wear, with similar shedding seen independent of solution or lens wear duration (p > 0.05).

Conclusions. SICS occurred earlier but to a significantly lower degree when PureVision lenses were presoaked in OFR compared with RMP, while lenses presoaked in CC did not cause SICS. Ocular surface cell shedding after lens removal was not impacted by lens wear durations of <=2 h.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is an ultimate objective to reconstruct an image with high quality using a compact representation, which is the basic step in image-manipulation fields. We propose an effective vectorization based approach to reconstruct an image using a triangular mesh associated with Loop subdivision scheme in the present paper. With an initial control mesh obtained by simplifying a dense mesh from a quality-preserved triangulation, we produce the final optimal control mesh by optimizing a mesh over topologies and colors to approximate the given image. The main advantages of the approach include: (1) the reconstruction of an image is not restricted to be aligned with image coordinate axes; (2) a high order continuous function is defined over a triangle instead of a bilinear interpolation; (3) it is a compact and vector-based representation easy to edit and transmit. Experimental results are presented to confirm the effectiveness of the method. Comparisons with the bi-cubic spline and the mesh simplification methods demonstrate the merits of our method in reconstruction quality and representation size.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The notion of certificateless cryptography is aimed to eliminate the use of certificates in traditional public key cryptography and also to solve the key-escrow problem in identity-based cryptography. Many kinds of security models have been designed for certificateless cryptography and many new schemes have been introduced based on the correspondence of the security models. In generally speaking, a stronger security model can ensure a certificateless cryptosystem with a higher security level, but a realistic model can lead to a more efficient scheme. In this paper, we focus on the efficiency of a certificateless signature (CLS) scheme and introduce an efficient CLS scheme with short signature size. On one hand, the security of the scheme is based on a realistic model. In this model, an adversary is not allowed to get any valid signature under false public keys. On the other hand, our scheme is as efficient as BLS short signature scheme in both communication and computation and, therefore, turns out to be more efficient than other CLS schemes proposed so far. We provide a rigorous security proof of our scheme in the random oracle model. The security of our scheme is based on the k-CAA hard problem and a new discovered hard problem, namely the modified k-CAA problem. Our scheme can be applied to systems where signatures are typed in by human or systems with low-bandwidth channels and/or low-computation power.