• Title/Summary/Keyword: related-key

Search Result 4,020, Processing Time 0.032 seconds

Public Key Encryption with Keyword Search for Restricted Testability (검증 능력이 제한된 검색 가능한 공개키 암호시스템)

  • Eom, Ji-Eun;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.3-10
    • /
    • 2011
  • To provide efficient keyword search on encrypted data, a public key encryption with keyword search (PEKS) was proposed by Boneh et al. A sender encrypts an e-mail and keywords with receiver's public key, respectively and uploads them on a server. Then a receiver generates a trapdoor of w with his secret key to search an e-mail related with some keyword w. However, Byun et al. showed that PEKS and some related schemes are not secure against keyword guessing attacks. In this paper, we propose a public key encryption with keyword search for restricted testability (PEKS-RT) scheme and show that our scheme is secure against keyword guessing attacks.

An Event-Driven Entity-Relationship Modeling Method for Creating a Normalized Logical Data Model (정규화된 논리적 데이터 모델의 생성을 위한 사건 기반 개체-관계 모델링 방법론)

  • Yoo, Jae-Gun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.37 no.3
    • /
    • pp.264-270
    • /
    • 2011
  • A new method for creating a logical data model is proposed. The logical data model developed by the method defines table, primary key, foreign key, and fields. The framework of the logical data model is constructed by modeling the relationships between events and their related entity types. The proposed method consists of a series of objective and quantitative decisions such as maximum cardinality of relationships and functional dependency between the primary key and attributes. Even beginners to database design can use the methology as long as they understand such basic concepts about relational databases as primary key, foreign key, relationship cardinality, parent-child relationship, and functional dependency. The simple and systematic approach minimizes decision errors made by a database designer. In practial database design the method creates a logical data model in Boyce-Codd normal form unless the user of the method makes a critical decision error, which is very unlikely.

A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment

  • Zhu, Hongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.811-829
    • /
    • 2015
  • One-way authenticated key agreement protocols, aiming at solving the problems to establish secure communications over public insecure networks, can achieve one-way authentication of communicating entities for giving a specific user strong anonymity and confidentiality of transmitted data. Public Key Infrastructure can design one-way authenticated key agreement protocols, but it will consume a large amount of computation. Because one-way authenticated key agreement protocols mainly concern on authentication and key agreement, we adopt multi-server architecture to realize these goals. About multi-server architecture, which allow the user to register at the registration center (RC) once and can access all the permitted services provided by the eligible servers. The combination of above-mentioned ideas can lead to a high-practical scheme in the universal client/server architecture. Based on these motivations, the paper firstly proposed a new one-way authenticated key agreement scheme based on multi-server architecture. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the efficiency analysis of our proposed scheme.

PCR-mediated Recombination of the Amplification Products of the Hibiscus tiliaceus Cytosolic Glyceraldehyde-3-phosphate Dehydrogenase Gene

  • Wu, Linghui;Tang, Tian;Zhou, Renchao;Shi, Suhua
    • BMB Reports
    • /
    • v.40 no.2
    • /
    • pp.172-179
    • /
    • 2007
  • PCR-mediated recombination describes the process of in vitro chimera formation from related template sequences present in a single PCR amplification. The high levels of genetic redundancy in eukaryotic genomes should make recombination artifacts occur readily. However, few evolutionary biologists adequately consider this phenomenon when studying gene lineages. The cytosolic glyceraldehyde-3-phosphate dehydrogenase gene (GapC), which encodes a NADP-dependent nonphosphorylating glyceraldehyde-3-phosphate dehydrogenase in the cytosol, is a classical lowcopy nuclear gene marker and is commonly used in molecular evolutionary studies. Here, we report on the occurrence of PCR-mediated recombination in the GapC gene family of Hibiscus tiliaceus. The study suggests that recombinant areas appear to be correlated with DNA template secondary structures. Our observations highlight that recombination artifacts should be considered when studying specific and allelic phylogenies. The authors suggest that nested PCR be used to suppress PCRmediated recombination.

A visual identification key to Orchidaceae of Korea

  • Seo, Seon-Won;Oh, Sang-Hun
    • Korean Journal of Plant Taxonomy
    • /
    • v.47 no.2
    • /
    • pp.124-131
    • /
    • 2017
  • Species identification is a fundamental and routine process in plant systematics, and linguistic-based dichotomous keys are widely used in the identification process. Recently, novel tools for species identification have been developed to improve the accuracy, ease to use, and accessibility related to these tasks for a broad range of users given the advances in information and communications technology. A visual identification key is such an approach, in which couplets consist of images of plants or a part of a plant instead of botanical terminology. We developed a visual identification key for 101 taxa of Orchidaceae in Korea and evaluated its performance. It uses short statements for image couplets to avoid misinterpretations by users. The key at the initial steps (couplets) uses relatively easy characters that can be determined with the naked eye. The final steps of the visual key provide images of species and information about distributions and flowering times to determine the species that best fit the available information. The number of steps required to identify a species varies, ranging from three to ten with an average of 4.5. A performance test with senior college students showed that species were accurately identified using the visual key at a rate significantly higher than when using a linguistic-based dichotomous key and a color manual. The findings presented here suggest that the proposed visual identification key is a useful tool for the teaching of biodiversity at schools, for the monitoring of ecosystems by citizens, and in other areas that require rapid, easy, and accurate identifications of species.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

Real-Time PCR Analysis of Metabolic Pathway of PHB in Acidiphilium cryptum DX1-1

  • Xu, Ai-Ling;Xia, Jin-Lan;Liu, Ke-Ke;Li, Li;Yang, Yu;Nie, Zhen-Yuan;Qiu, Guan-Zhou
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.1
    • /
    • pp.71-77
    • /
    • 2010
  • The time, yield, and related genes expression of PHB accumulation of Acidiphilium cryptum DX1-1 were investigated under four different initial C/N ratios, 1.2, 2.4, 7.5, and 24. The results of time and yield of poly-$\beta$-hydroxybutyrate (PHB) accumulation show that the initial C/N ratio of 2.4 was optimum for strain DX1-1 to accumulate PHB, but both higher and lower initial C/N ratios did not favor that process. Based on the genome of Acidiphilium cryptum JF-5, 13 PHB accumulation related genes in strain JF-5 were chosen and successfully cloned from strain DX1-1. The differential expressions of the 13 functional genes, in different C/N ratios as cited above, were then studied by real-time PCR. The results show that all the 13 genes were most upregulated when the initial C/N ratio was 2.4, and among which the gene Acry_3030 encoding poly-$\beta$-hydroxybutyrate polymerase and Aery_0626 encoding acetyl-CoA synthetase were much more upregulated than the other genes, which proved that they play the most important role for PHB accumulation, and acetate is the main initial substance for PHB accumulation for strain DX1-1. Potential regulatory motifs analysis showed that the genes related to PHB accumulation are regulated by different promoters and that the motif had weak similarity to the model promoters, suggesting that PHB metabolism in Acidiphilium cryptum may be mediated by a different mechanism.

Microbial Floral Dynamics of Chinese Traditional Soybean Paste (Doujiang) and Commercial Soybean Paste

  • Gao, Xiuzhi;Liu, Hui;Yi, Xinxin;Liu, Yiqian;Wang, Xiaodong;Xu, Wensheng;Tong, Qigen;Cui, Zongjun
    • Journal of Microbiology and Biotechnology
    • /
    • v.23 no.12
    • /
    • pp.1717-1725
    • /
    • 2013
  • Traditional soybean paste from Shandong Liangshan and Tianyuan Jiangyuan commercial soybean paste were chosen for analysis and comparison of their bacterial and fungal dynamics using denaturing gel gradient electrophoresis and 16S rRNA gene clone libraries. The bacterial diversity results showed that more than 20 types of bacteria were present in traditional Shandong soybean paste during its fermentation process, whereas only six types of bacteria were present in the commercial soybean paste. The predominant bacteria in the Shandong soybean paste were most closely related to Leuconostoc spp., an uncultured bacterium, Lactococcus lactis, Bacillus licheniformis, Bacillus spp., and Citrobacter freundii. The predominant bacteria in the Tianyuan Jiangyuan soybean paste were most closely related to an uncultured bacterium, Bacillus licheniformis, and an uncultured Leuconostoc spp. The fungal diversity results showed that 10 types of fungi were present in the Shandong soybean paste during the fermentation process, with the predominant fungi being most closely related to Geotrichum spp., an uncultured fungal clone, Aspergillus oryzae, and yeast species. The predominant fungus in the commercial soybean paste was Aspergillus oryzae.

The role of RNA epigenetic modification-related genes in the immune response of cattle to mastitis induced by Staphylococcus aureus

  • Yue Xing;Yongjie Tang;Quanzhen Chen;Siqian Chen;Wenlong Li;Siyuan Mi;Ying Yu
    • Animal Bioscience
    • /
    • v.37 no.7
    • /
    • pp.1141-1155
    • /
    • 2024
  • Objective: RNA epigenetic modifications play an important role in regulating immune response of mammals. Bovine mastitis induced by Staphylococcus aureus (S. aureus) is a threat to the health of dairy cattle. There are numerous RNA modifications, and how these modification-associated enzymes systematically coordinate their immunomodulatory effects during bovine mastitis is not well reported. Therefore, the role of common RNA modification-related genes (RMRGs) in bovine S. aureus mastitis was investigated in this study. Methods: In total, 80 RMRGs were selected for this study. Four public RNA-seq data sets about bovine S. aureus mastitis were collected and one additional RNA-seq data set was generated by this study. Firstly, quantitative trait locus (QTL) database, transcriptome-wide association studies (TWAS) database and differential expression analyses were employed to characterize the potential functions of selected enzyme genes in bovine S. aureus mastitis. Correlation analysis and weighted gene co-expression network analysis (WGCNA) were used to further investigate the relationships of RMRGs from different types at the mRNA expression level. Interference experiments targeting the m6 A demethylase FTO and utilizing public MeRIP-seq dataset from bovine Mac-T cells were used to investigate the potential interaction mechanisms among various RNA modifications. Results: Bovine QTL and TWAS database in cattle revealed associations between RMRGs and immune-related complex traits. S. aureus challenged and control groups were effectively distinguished by principal component analysis based on the expression of selected RMRGs. WGCNA and correlation analysis identified modules grouping different RMRGs, with highly correlated mRNA expression. The m6 A modification gene FTO showed significant effects on the expression of m6 A and other RMRGs (such as NSUN2, CPSF2, and METTLE), indicating complex co-expression relationships among different RNA modifications in the regulation of bovine S. aureus mastitis. Conclusion: RNA epigenetic modification genes play important immunoregulatory roles in bovine S. aureus mastitis, and there are extensive interactions of mRNA expression among different RMRGs. It is necessary to investigate the interactions between RNA modification genes regulating complex traits in the future.