980 resultados para Access structure


Relevância:

70.00% 70.00%

Publicador:

Resumo:

The purpose of this paper is to describe a new decomposition construction for perfect secret sharing schemes with graph access structures. The previous decomposition construction proposed by Stinson is a recursive method that uses small secret sharing schemes as building blocks in the construction of larger schemes. When the Stinson method is applied to the graph access structures, the number of such “small” schemes is typically exponential in the number of the participants, resulting in an exponential algorithm. Our method has the same flavor as the Stinson decomposition construction; however, the linear programming problem involved in the construction is formulated in such a way that the number of “small” schemes is polynomial in the size of the participants, which in turn gives rise to a polynomial time construction. We also show that if we apply the Stinson construction to the “small” schemes arising from our new construction, both have the same information rate.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We introduce multiple-control fuzzy vaults allowing generalised threshold, compartmented and multilevel access structure. The presented schemes enable many useful applications employing multiple users and/or multiple locking sets. Introducing the original single control fuzzy vault of Juels and Sudan we identify several similarities and differences between their vault and secret sharing schemes which influence how best to obtain working generalisations. We design multiple-control fuzzy vaults suggesting applications using biometric credentials as locking and unlocking values. Furthermore we assess the security of our obtained generalisations for insider/ outsider attacks and examine the access-complexity for legitimate vault owners.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We introduce a broad lattice manipulation technique for expressive cryptography, and use it to realize functional encryption for access structures from post-quantum hardness assumptions. Specifically, we build an efficient key-policy attribute-based encryption scheme, and prove its security in the selective sense from learning-with-errors intractability in the standard model.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A crucial issue with hybrid quantum secret sharing schemes is the amount of data that is allocated to the participants. The smaller the amount of allocated data, the better the performance of a scheme. Moreover, quantum data is very hard and expensive to deal with, therefore, it is desirable to use as little quantum data as possible. To achieve this goal, we first construct extended unitary operations by the tensor product of n, n ≥ 2, basic unitary operations, and then by using those extended operations, we design two quantum secret sharing schemes. The resulting dual compressible hybrid quantum secret sharing schemes, in which classical data play a complementary role to quantum data, range from threshold to access structure. Compared with the existing hybrid quantum secret sharing schemes, our proposed schemes not only reduce the number of quantum participants, but also the number of particles and the size of classical shares. To be exact, the number of particles that are used to carry quantum data is reduced to 1 while the size of classical secret shares also is also reduced to l−2 m−1 based on ((m+1, n′)) threshold and to l−2 r2 (where r2 is the number of maximal unqualified sets) based on adversary structure. Consequently, our proposed schemes can greatly reduce the cost and difficulty of generating and storing EPR pairs and lower the risk of transmitting encoded particles.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The methodology of designing normative terminological products has been described in several guides and international standards. However, this methodology is not always applicable to designing translation-oriented terminological products which differ greatly from normative ones in terms of volume, function, and primary target group. This dissertation has three main goals. The first is to revise and enrich the stock of concepts and terms required in the process of designing an LSP dictionary for translators. The second is to detect, classify, and describe the factors which determine the characteristics of an LSP dictionary for translators and affect the process of its compilation. The third goal is to provide recommendations on different aspects of dictionary design. The study is based on an analysis of dictionaries, dictionary reviews, literature on translation-oriented lexicography, material from several dictionary projects, and the results of questionnaires. Thorough analysis of the concept of a dictionary helped us to compile a list of designable characteristics of a dictionary. These characteristics include target group, function, links to other resources, data carrier, list of lemmata, information about the lemmata, composition of other parts of the dictionary, compression of the data, structure of the data, and access structure. The factors which determine the characteristics of a dictionary have been divided into those derived from the needs of the intended users and those reflecting the restrictions of the real world (e.g. characteristics of the data carrier and organizational factors) and attitudes (e.g. traditions and scientific paradigms). The designer of a dictionary is recommended to take the intended users' needs as the starting point and aim at finding the best compromise between the conflicting factors. When designing an LSP dictionary, much depends on the level of knowledge of the intended users about the domain in question as well as their general linguistic competence, LSP competence, and lexicographic competence. This dissertation discusses the needs of LSP translators and the role of the dictionary in the process of translation of an LSP text. It also emphasizes the importance of planning lexicographic products and activities, and addresses many practical aspects of dictionary design.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedicated to Nikola Obreshkoff and Lubomir Tschakaloff , Sofia, July, 2006. The material in this paper was presented in part at INDOCRYPT 2002

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The paper has been presented at the International Conference Pioneers of Bulgarian Mathematics, Dedicated to Nikola Obreshkoff and Lubomir Tschakaloff , Sofia, July, 2006. The material in this paper was presented in part at the 11th Workshop on Selected Areas in Cryptography (SAC) 2004

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Attribute-based signature (ABS) is a novel cryptographic primitive, which can make the signing party sign a message with fine-grained control over identifying information. ABS only reveals the fact that the verified message must be signed by a user with a set of attributes satisfying a predicate. Thus, ABS can hide any identifying information and make fine-grained control on signing. Presently, many attribute-based signature schemes have been proposed, but most of them are not very efficient. Maji et al. recently presented a complete definition and construction about ABS for monotone predicates and showed three instantiations under their framework for ABS. Although the most practical one of their instantiations is efficient, the instantiation is constructed in the generic group model and has been proved to be insecure. Then, Okamoto et al. proposed an attribute-based signature scheme in the standard model, which can support generalized non-monotone predicates over access structure. However, their scheme is not efficient in practice. In this paper, we present a framework for ABS and show a detailed security model for ABS. Under our framework, we present an attribute-based signature scheme for monotone predicates in the standard model, where we choose the Waters’ signature scheme as the prototype of our attribute-based signature scheme. Compared with the Maji’s scheme in the generic group model, the proposed scheme is constructed in the standard model. Furthermore, compared with the Okamoto’s scheme, the proposed scheme is more efficient by decreasing the computation cost.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Based on the consolidated statements data of the universal/commercial banks (UKbank) and non-bank financial institutions with quasi-banking licenses, this paper presents a keen necessity of obtaining data in detail on both sides (assets and liabilities) of their financial conditions and further analyses. Those would bring more adequate assessments on the Philippine financial system, especially with regard to each financial subsector's financing/lending preferences and behavior. The paper also presents a possibility that the skewed locational and operational distribution exists in the non-UKbank financial subsectors. It suggests there may be a significant deviation from the authorities' (the BSP, SEC and others) intended/anticipated financial system in the banking/non-bank financial institutions' real operations.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The zinc metallopeptidase neurolysin is shown by x-ray crystallography to have large structural elements erected over the active site region that allow substrate access only through a deep narrow channel. This architecture accounts for specialization of this neuropeptidase to small bioactive peptide substrates without bulky secondary and tertiary structures. In addition, modeling studies indicate that the length of a substrate N-terminal to the site of hydrolysis is restricted to approximately 10 residues by the limited size of the active site cavity. Some structural elements of neurolysin, including a five-stranded β-sheet and the two active site helices, are conserved with other metallopeptidases. The connecting loop regions of these elements, however, are much extended in neurolysin, and they, together with other open coil elements, line the active site cavity. These potentially flexible elements may account for the ability of the enzyme to cleave a variety of sequences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Homologous recombinational repair is an essential mechanism for repair of double-strand breaks in DNA. Recombinases of the RecA-fold family play a crucial role in this process, forming filaments that utilize ATP to mediate their interactions with singleand double-stranded DNA. The recombinase molecules present in the archaea (RadA) and eukaryota (Rad51) are more closely related to each other than to their bacterial counterpart (RecA) and, as a result, RadA makes a suitable model for the eukaryotic system. The crystal structure of Sulfolobus solfataricus RadA has been solved to a resolution of 3.2 A° in the absence of nucleotide analogues or DNA, revealing a narrow filamentous assembly with three molecules per helical turn. As observed in other RecA-family recombinases, each RadA molecule in the filament is linked to its neighbour via interactions of a short b-strand with the neighbouring ATPase domain. However, despite apparent flexibility between domains, comparison with other structures indicates conservation of a number of key interactions that introduce rigidity to the system, allowing allosteric control of the filament by interaction with ATP. Additional analysis reveals that the interaction specificity of the five human Rad51 paralogues can be predicted using a simple model based on the RadA structure.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background The bisphosphonate, zoledronic acid (ZOL), can inhibit osteoclasts leading to decreased osteoclastogenesis and osteoclast activity in bone. Here, we used a mixed osteolytic/osteoblastic murine model of bone-metastatic prostate cancer, RM1(BM), to determine how inhibiting osteolysis with ZOL affects the ability of these cells to establish metastases in bone, the integrity of the tumour-bearing bones and the survival of the tumour-bearing mice. Methods The model involves intracardiac injection for arterial dissemination of the RM1(BM) cells in C57BL/6 mice. ZOL treatment was given via subcutaneous injections on days 0, 4, 8 and 12, at 20 and 100 µg/kg doses. Bone integrity was assessed by micro-computed tomography and histology with comparison to untreated mice. The osteoclast and osteoblast activity was determined by measuring serum tartrate-resistant acid phosphatase 5b (TRAP 5b) and osteocalcin, respectively. Mice were euthanased according to predetermined criteria and survival was assessed using Kaplan Meier plots. Findings Micro-CT and histological analysis showed that treatment of mice with ZOL from the day of intracardiac injection of RM1(BM) cells inhibited tumour-induced bone lysis, maintained bone volume and reduced the calcification of tumour-induced endochondral osteoid material. ZOL treatment also led to a decreased serum osteocalcin and TRAP 5b levels. Additionally, treated mice showed increased survival compared to vehicle treated controls. However, ZOL treatment did not inhibit the cells ability to metastasise to bone as the number of bone-metastases was similar in both treated and untreated mice. Conclusions ZOL treatment provided significant benefits for maintaining the integrity of tumour-bearing bones and increased the survival of tumour bearing mice, though it did not prevent establishment of bone-metastases in this model. From the mechanistic view, these observations confirm that tumour-induced bone lysis is not a requirement for establishment of these bone tumours.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Doping is an effective approach that allows for the intrinsic modification of the electrical and chemical properties of nanomaterials. Recently, a graphene and carbon nanotube hybrid structure (GNHS) has been reported, which extends the excellent properties of carbon-based materials to three dimensions. In this paper, we carried out a first-time investigation on the tensile properties of the hybrid structures with different dopants. It is found that with the presence of dopants, the hybrid structures usually exhibit lower yield strength, Young’s modulus, and earlier yielding compared to that of a pristine hybrid structure. For dopant concentrations below 2.5% no significant reduction of Young’s modulus or yield strength could be observed. For all considered samples, the failure is found to initiate at the region where the nanotubes and graphene sheets are connected. After failure, monatomic chains are normally observed around the failure region. Dangling graphene layers without the separation of a residual CNT wall are found to adhere to each other after failure with a distance of about 3.4 Å. This study provides a fundamental understanding of the tensile properties of the doped graphene–nanotube hybrid structures, which will benefit the design and also the applications of graphene-based hybrid materials.