搜索结果: 1-15 共查到“asymmetric”相关记录191条 . 查询时间(0.046 秒)
南京农业大学农学院《Plant Cell》发表宋庆鑫教授团队“Asymmetric variation of DNA methylation during domestication and de-domestication of rice”(图)
宋庆鑫 水稻栽培 基因
2023/10/28
水稻是全球最为重要的粮食作物之一,在其漫长的驯化过程中形成了形态各异的水稻栽培亚型,包括粳稻、籼稻、Aro和Aus等。在水稻栽培种植历史过程中,有些水稻逐渐恢复部分野生稻表型特征,最终演化成严重威胁全球水稻产量的杂草稻,这种现象称之为“去驯化”。通过基因组进化研究发现,大量驯化位点的变异在去驯化过程中并不能得到恢复,这就暗示着可能存在别的遗传机制来调控杂草稻在去驯化过程中恢复野生稻表型。DNA甲基...
Separating Standard and Asymmetric Password-Authenticated Key Exchange
PAKE Password-Authenticated Key Exchange
2019/9/23
Password-Authenticated Key Exchange (PAKE) is a method to establish cryptographic keys between two users sharing a low-entropy password. In its asymmetric version, one of the users acts as a server an...
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography
Undeniable quantum signature scheme Impersonation attack Quantum asymmetric cryptography
2019/7/15
In recent years, several cryptographic scholars have proposed quantum blind signature schemes. However, their methods require the signatories and the inspectors to share common keys in advance, which ...
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that share a password to establish a shared key in a way that is immune to oine attacks. Asymmetric PAKE (aPAKE) [21] adapts thi...
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption
message franking designated verifier signatures deniability
2019/5/28
Content moderation is crucial for stopping abuse and harassment via messaging on online platforms. Existing moderation mechanisms, such as message franking, require platform providers to see user iden...
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes
lattice public-key encryption digital signature
2019/5/21
Lattice-based cryptosystems are less efficient than their number-theoretic counterparts (based on RSA, discrete logarithm, etc.) in terms of key and ciphertext (signature) sizes. For adequate security...
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography
Undeniable quantum signature scheme Impersonation attack Quantum asymmetric cryptography
2019/1/16
In 2018, Shi et al. 's showed that Kaushik et al.'s quantum signature scheme is defective. It suffers from the forgery attack. They further proposed an improvement, trying to avoid the attack. However...
Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups
public-key cryptography Structure-Preserving Signatures
2019/1/2
Structure-Preserving Signatures (SPSs) are a useful tool for the design of modular cryptographic protocols. Recent series of works have shown that by limiting the message space of those schemes to the...
Simpler Constructions of Asymmetric Primitives from Obfuscation
obfuscation public-key encryption identity-based encryption
2018/6/7
We revisit constructions of asymmetric primitives from obfuscation and give simpler alternatives. We consider public-key encryption, (hierarchical) identity-based encryption ((H)IBE), and predicate en...
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks
Password authentication key exchange PAKE
2018/3/7
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that only share a password to establish a shared key in a way that is immune to offline attacks. Asymmetric PAKE (aPAKE) strength...
Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations
cryptographic protocols secure comparison
2018/3/6
Within recent years, secure comparison protocols have been proposed using binary decomposition and properties of algebraic fields. These have been repeatedly optimized and increased in efficiency, but...
Asymmetric competition in food industry with product substitutability
food quality game theory non-cooperative product substitutability
2016/8/1
The paper analyses the effects of asymmetric competition on food industry with product substitutability by establishing a two-stage dynamic game model. The equilibrium is captured under both the Courn...
Excited State Energy Transfer Pathways in Photosynthetic Reaction Centers.4.Asymmetric Energy Transfer in the Heterodimer Mutant
in-modified beta zeolite reductive solid-state ion exchange Lewis acidity m-xylene transformation
2016/5/23
In bacterial photosynthetic reaction centers, ultrafast singlet excited state energy transfer occurs from the monomeric bacteriochlorophylls, B, and bacteriopheophytins, H, to the homodimer special pa...
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE
UC-PAKE bilinear pairings SXDH
2016/3/4
We introduce a novel notion of smooth (-verifier) non- interactive
zero-knowledge proofs (NIZK) which parallel the familiar notion of
smooth projective hash functions (SPHF). We also show that the r...
Asymmetric Nested Lattice Samples
Computer experiment Design of experiments Asymmetric orthogonal ar- ray Orthogonal array based Latin hypercube Sequential design
2016/1/19
We propose an approach for constructing asymmetric nested lattice samples by randomizing asymmetric nested orthogonal arrays. Such designs possess a desirable nested structure and have attractive spac...