- Cryptography and Data Security
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- Complexity and Algorithms in Graphs
- Coding theory and cryptography
- Privacy-Preserving Technologies in Data
- Cryptography and Residue Arithmetic
- Cooperative Communication and Network Coding
- Cryptographic Implementations and Security
- Cloud Data Security Solutions
- Water Quality Monitoring and Analysis
- Wireless Communication Security Techniques
- Advanced Authentication Protocols Security
- Toxic Organic Pollutants Impact
- Chaos-based Image/Signal Encryption
- Algal biology and biofuel production
- Advanced Steganography and Watermarking Techniques
- Chemical Analysis and Environmental Impact
- Impact of AI and Big Data on Business and Society
- Chinese history and philosophy
- Leadership, Courage, and Heroism Studies
- Service-Learning and Community Engagement
- Advanced oxidation water treatment
- Education, Technology, and Economics
- Advanced Wireless Communication Technologies
Xi’an University of Posts and Telecommunications
2018-2024
Qinghai University Affiliated Hospital
2021-2024
Qujing Normal University
2024
Chinese Academy of Medical Sciences & Peking Union Medical College
2024
China University of Mining and Technology
2024
Shandong University
2019-2021
Qinghai Normal University
2004-2017
Luoyang Normal University
2012
Northwest Normal University
2008-2009
Beijing Center for Disease Prevention and Control
2005-2008
Driven by new situation of "Internet +," Internet has achieved the integrated development with all walks life. Among them, fifth generation is a key technology to promote deep integration Internet-of-Things equipment, cloud computing, blockchain and other trades. Hence, it necessary for IoTs consider cost efficiency authentication confidentiality communication. For effectively solving above problems, we devise certificateless elliptic curve aggregate signcryption (CL-ECASC) scheme that can...
Abstract As one of the most attractive next‐generation probiotics, mucin‐degrading Akkermansia muciniphila has emerged as an essential and integral factor in maintaining human health affecting pathological outcomes. Its abundance is inversely associated with various metabolic diseases (e.g., obesity type 2 diabetes), cardiovascular diseases, intestinal inflammation. Supplementing A. to restore gut microbiota ecosystem a promising approach for treating disorders. However, direct utilization...
Electronic cash (e-cash) has become major payment way in the era of internet things. However, leakage user privacy and transaction data is becoming more serious e-cash system. To solve these problems, we construct a new certificateless blind signcryption from NTRU lattice (NTRUL-CLBSC) suitable for e-cash. NTRUL-CLBSC low communication overhead high calculation efficiency because small storage space short key size number theory research unit (NTRU) lattice. Based on RSIS DNCC problems...
Certificateless signcryption (CLSC) can simultaneously fulfill certificateless encryption and signature; however, most CLSC schemes need costly computational overhead due to the usage of pairing operations. How improve its efficiency is a very significant research problem. In this paper, we propose pairing-free secure scheme. random oracle model, proposed scheme indistinguishability against adaptive chosen-ciphertext attacks in confidentiality unforgeability chosen-message unforgeability....
Proxy signcryption means that the proxy signcrypter obtains delegate authorization from original and then signcrypts specified message on behalf of signcrypter. In this paper, we construct an identity-based protocol (IBPSP) based universally composable (UC) framework. random oracle model, prove has semantic security under gap bilinear Diffie-Hellman computational assumptions. At same time, ideal functionality is defined in UC framework, also equivalence between its IND-CCA2 UF-CMA security....
A (t,n) threshold signcryption scheme makes the distributor authorize a group with n members, any t or more signcrypters can cooperatively use keys to sign message; however, t−1 fewer cannot. Threshold has broad applications in electronic auction, election, distributed environment, cloud computing and block chain. In this paper, we combine certificateless cryptosystem construct secure efficient signcrypton secret sharing mechanism (SSM-CLTSCS), which is provably indistinguishable unforgeable...
Threshold signature can solve the problems of high cost and network congestion during execution smart contracts. However, information transmitted in public links is vulnerable to eavesdropping, tampering other attacks, it essential ensure confidentiality integrity data transmission. traditional threshold signcryption not suitable for blockchain setting cannot withstand quantum computing attacks. In view these reasons, one lattice-based oracle transmission (BCODT-LTSC) devised this article....
Certificateless signcryption can simultaneously provide certificateless signature and encryption. In recent years, many schemes have been proposed. However, these are based on traditional mathematical theory not the ability of resisting quantum computing attacks. Up to now, lattice-based or encryption proposed; however, only one function cannot fulfill two functions at same time. consideration this reason, in article, a scheme from lattice (L-CLSS) is constructed. L-CLSS has three...
This review examines the technological bottlenecks, potential solutions, and future development directions in treatment resource utilization of semi-coking wastewater (SCOW) China. By comprehensively investigating industry analyzing research hotspots existing projects, this study systematically explores current status challenges each unit, emphasizing necessity for innovative technologies that offer high efficiency, engineering feasibility, environmental friendliness, effective recovery....
As a cryptography primitive for secure data transmission, certificateless proxy signcryption (CLPS) allows an original signcrypter to entrust his signing authority specified message on behalf. In this paper, we combine CLPS with cyclic multiplication groups (CMGs) construct new scheme from CMGs (CMGs-CLPSS). CMGs-CLPSS will receive significant attention because it simplifies the traditional public key cryptosystem (PKC) and solves escrow issue suffered by identity-based (IB-PKC). CMGs-CLPSS,...
Abstract A study was carried out to the accumulative levels and dynamic changes of organochlorine pesticides in human milk Beijing from 1982 1998, effect prohibition restriction on use DDT BHC (666) China 1983. The samples were collected women during lactation period four districts 1991, 1993 respectively. contents determined according standard method biology-monitoring PR China. average fat content about 3% 1982–1998 Beijing. concentration pp-DDT op-DDT 1985 less than 0.10 mg/kg remained so...
Traditional certificateless ring signature is not suitable for the network coding environment. In this view, a new (CL-NCRS) devised by using techniques of multisource and signature. Network kind information interaction technology can improve system robustness save wireless resources. CL-NCRS satisfies unforgeability unconditional anonymity; moreover, it has relatively higher communication computational efficiency.
Ring signcryption with no group administrator satisfies the decentralization and blockchain anonymity. In this article, we construct new lattice-based ring scheme suitable for consortium (CB-LRSCS), in which smart contract controls process of unsigncryption to make system be fair reliable. CB-LRSCS can protect user privacy by reducing connection between information, it reliability ethereum environment. also has characteristics high efficiency, anti-quantum, anti-forgery, confidentiality...
Network coding can improve network transmission performance and reduce data delay. However, the nodes in are vulnerable to pollution attacks. Previous schemes based on difficult problems number theory cannot resist quantum computing Hence, certificateless multi-source signcryption with lattice (LCL-MSSC) is devised for coding, it uses common public key verify combination ciphertext from different source node users. Based learning errors inhomogeneous small integer solution problems, LCL-MSSC...
Inspired by plant transpiration, an attached microalgae−simulated system was designed to enhance the transpiration of reverse osmosis concentrated water (i.e., WROC) and realize conversion pollutants microalgae biomass. The results showed that production rate clean could reach as high 14.84 L·m−2·day−1, which significantly influenced humidity air growth status microalgae. Moreover, enhancement evaporation more obvious under relatively low humidity. Pollutants, transported along with water,...