Abstract:
The present invention discloses a digital signature scheme based on braid group conjugacy problem and a verifying method thereof, wherein the signatory S selects three braids xεLBm(l), x′εBn(l), aεBn(l), and considers braid pair (x′,x) as a public key of S, braid a as a private key of S; Signatory S uses hash function h for a message M needing signature to get y=h(M)εBn(l); generating a braid bεRBn−1−m(l) randomly, then signing the message M with the own private key a and the braid b generated randomly to obtain Sign(M)=a−1byb−1a; a signature verifying party V obtains the public key of S, calculating the message M by employing a system parameter hash function h, obtaining the y=h(M); judging whether sign(M) and y are conjugate or not, if not, sign(M) is an illegal signature, the verification fails; if yes, sign(M) is a legal signature of message M; the present invention avoids the problem of k-CSP in SCSS signature scheme of prior art, and improves the security of signature algorithm and reduces the number of braids involved and the number for conjugacy decision without reducing security, thereby improving the operation efficiency of signature.
Abstract translation:本发明公开了一种基于编织群共轭问题的数字签名方案及其验证方法,其中签名者S选择三个辫子bra B m SUB SUB SUB SUB SUB SUB SUB SUB SUB SUB (l),aepsilonB(1),并将辫子对(x',x)视为S的公钥,辫子a作为S的私钥; 签名者S使用哈希函数h来获得需要签名的消息M,以获得y = h(M)epsilonB(1); 随机生成辫子bepsilonRB n-1-m(l),然后用自己的私钥a签署消息M,随机生成辫子b以获得Sign(M)= a& 1 SUP> BYB SUP> -1; 签名验证方V获得S的公开密钥,通过采用系统参数散列函数h来计算消息M,获得y = h(M); 判断符号(M)和y是否是共轭的,如果不是,则(M)是非法签名,验证失败; 如果是,则(M)是消息M的合法签名; 本发明避免了现有技术的SCSS签名方案中的k-CSP问题,提高了签名算法的安全性,减少了涉及的辫子数量和共轭决定的数量,而不降低安全性,从而提高了签名的操作效率。
Abstract:
The present invention discloses a digital signature scheme based on braid group conjugacy problem and a verifying method thereof, wherein a signatory S selects three braids xεLBm(l), x′εBn(l), aεBn(l), and considers braid pair (x′,x) as a public key of S, braid a as a private key of S; Signatory S uses hash function h for a message M needing signature to get y=h(M)εBn(l); generating a braid bεRBn−1−m(l) randomly, then signing M with a and b to obtain Sign(M)=a−1byb−1a; a signature verifying party V obtains the public key of S, calculating the message M by employing hash function h, obtaining the y=h(M); judging whether sign(M) and y, sign(M)x′ and xy are conjugate or not, if yes, sign(M) is a legal signature of message M; the present invention reduces the number of braids involved and the number for conjugacy decision without reducing security, thereby improving the operation efficiency of signature.
Abstract:
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics.
Abstract:
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. A secure on-demand supply system and a traffic type acquisition method are disclosed. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics. The system of the disclosure satisfies security requirements of various users and various traffics, provides personalized security assurances for the users, and enhances user experience.
Abstract:
Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula (I) wherein X is C═O or SO2, R1 is C1-6 alkyl, R2 is aryl, heteroaryl, aryl, —(CH2)1-3aryl, or —(CH2)1-3heteroaryl, and n is 0 or 1. Methods of using the D3 receptor ligands in the treatment of diseases and conditions wherein modulation of the D3 receptor provides a benefit also are disclosed.
Abstract:
This invention relates to compositions comprising co-crystals of (−)-gossypol with a C1-8 carboxylic acid or C1-8 sulfonic acid which are useful as inhibitors of Bcl-2 family proteins. The invention also relates to the use of co-crystals of (−)-gossypol with a C1-8 carboxylic acid or C1-8 sulfonic acid for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.
Abstract:
Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula (I) wherein X is C═O or SO2, R1 is C1-6 alkyl, R2 is aryl, heteroaryl, aryl, —(CH2)1-3aryl, or —(CH2)1-3heteroaryl, and n is 0 or 1. Methods of using the D3 receptor ligands in the treatment of diseases and conditions wherein modulation of the D3 receptor provides a benefit also are disclosed.
Abstract:
Inhibitors of STAT3 are disclosed. Methods of using the STAT3 inhibitors in the treatment of diseases and conditions wherein inhibition of STAT3 provides a benefit, like cancers, also are disclosed.
Abstract:
The present invention relates to naturally occurring and chemically synthesized small molecule antagonists of XIAP family proteins. In particular, the present invention provides embelin and other XIAP inhibitors and methods of using these compounds as antagonists of the anti-apoptotic effects of XIAP family member proteins. The present invention also provides methods for treating diseases and pathologies (e.g., neoplastic diseases).
Abstract:
This invention relates to relates to methods for producing gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals. The invention also relates to pharmaceutical compositions comprising gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals and the use of gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.