Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou...Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.展开更多
Two primary patterns of body size variation have been recorded in ectotherms in relation to latitudinal/altitudinal shifts. In some, body size increases with increasing latitude/altitude whereas, in others, body size ...Two primary patterns of body size variation have been recorded in ectotherms in relation to latitudinal/altitudinal shifts. In some, body size increases with increasing latitude/altitude whereas, in others, body size decreases with increasing latitude/altitude. This clinal variation is generally assumed to be caused by local adaptation to environmental conditions however the selective variable(s) (temperature, humidity, diet quality, etc.) is still heavily debated. Here we investigate geographic variation in body size of dark and pale color morphs of males of the bush-cricket lsophya rizeensis collected from 15 locations along an elevation gradient ranging from 350 to 2 500 m. Using an information theoretical approach we evaluate the relative support of four different hypotheses (the temperature size rule, the moisture gradient hypothesis, the seasonal constraint hypothesis, and the primary productivity hypothesis) explaining body size variation along the altitudinal gradient. Body size variation in pale color morphs showed a curvilinear relationship with altitude while dark color morphs showed no variation in body size. Body size variation in pale color morphs was highly correlated with precipitation and temperature seasonality values thus giving strong support for the moisture gradient and seasonal constraint hypothesis. Our results reinforce the importance of gradients in humidity and seasonality over temperature in the creation of altitudinal body size clines and the role of selection for resistance to stress factors in the establishment of these clines. Whether a body size cline is observed or not might also depend on the phenotypic properties of the individuals, like coloration.展开更多
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp...We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack.展开更多
Let S be the set of n coins,in which there are m counterfeit coins, heavier (or lighter) than the normals. How many weighings do we need to find the m fakes by a balance? Denote by g_m(n) the least number of weighings...Let S be the set of n coins,in which there are m counterfeit coins, heavier (or lighter) than the normals. How many weighings do we need to find the m fakes by a balance? Denote by g_m(n) the least number of weighings we need.展开更多
An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules fo...An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules for this code is a representation system for cosets of a certain subgroup in the projective transformation group.A special case is studied,i.e.the rational normal curves are the conies over finite fields.The representation system for the cosets which determines the set of encoding rules will be given.展开更多
The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoret...The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoretic verifiable secret sharing over RSA (Rivest, Shamir, Adleman) modulus and give the rigorous security proof. It is shown how to distribute a secret among a group such that any set of k parties get no information about the secret. The presented scheme is generally applied to constructions of secure distributed multiplication and threshold or forward-secure signature protocols.展开更多
In this paper, through an information-theoretic approach, we construct estimations and confidence intervals of Z-functionals involving finite population and with the presence of auxiliary information. In particular, w...In this paper, through an information-theoretic approach, we construct estimations and confidence intervals of Z-functionals involving finite population and with the presence of auxiliary information. In particular, we give a method of estimating the variance of finite population with known mean. The modified estimates and confidence intervals for Z-functionals can adequately use the auxiliary information, at least not worse than what the standard ones do. A simulation study is presented to assess the performance of the modified estimates for the finite sample case.展开更多
Aims More data are needed about how genetic variation(GV)and envi-ronmental factors influence phenotypic variation within the natural populations of long-lived species with broad geographic distribu-tions.To fill this...Aims More data are needed about how genetic variation(GV)and envi-ronmental factors influence phenotypic variation within the natural populations of long-lived species with broad geographic distribu-tions.To fill this gap,we examined the correlations among envi-ronmental factors and phenotypic variation within and among 13 natural populations of Pinus tabulaeformis consisting of four demo-graphically distinct groups within the entire distributional range.Methods Using the Akaike’s information Criterion(AiC)model,we measured 12 morphological traits and constructed alternative candidate models for the relationships between each morphological trait and key climatic variables and genetic groups.We then compared the AiC weight for each candidate model to identify the best approximating model for ecogeographical variation of P.tabulaeformis.The partitioning of vari-ance was assessed subsequently by evaluating the independent vari-ables of the selected best models using partial redundancy analysis.Important Findings Significant phenotypic variation of the morphological traits was observed both within individual populations and among populations.Variation partition analyses showed that most of the phenotypic variation was co-determined by both GV and climatic factors.GV accounted for the largest proportion of reproductive trait variation,whereas local key climatic factors(i.e.actual evapotranspiration,AET)accounted for the largest proportion of phenotypic variation in the remaining investigated traits.Our results indicate that both genetic divergence and key environmental factors affect the phenotypic variation observed among populations of this species,and that reproductive and vegetative traits adaptively respond differently with respect to local environmental conditions.This partitioning of factors can inform those making predictions about phenotypic variation in response to future changes in climatic conditions(particularly those affecting AET).展开更多
An amplify-and-forward(AF) dual-hop relay is proposed for secure communication within Wyner s wiretap channel.Based on an information-theoretic formulation,the average secrecy rate is characterized when two legitimate...An amplify-and-forward(AF) dual-hop relay is proposed for secure communication within Wyner s wiretap channel.Based on an information-theoretic formulation,the average secrecy rate is characterized when two legitimate partners communicate over a quasi-static fading channel.Theoretical analysis and simulation results show that both cooperative strategies of average power scaling(APS) and instantaneous power scaling(IPS) are proved to be able to achieve information-theoretic security,and eavesdropper is unable to decode any information.展开更多
Introduction:Incorporating information on animal behavior in resource-based predictive modeling(e.g.,occurrence mapping)can elucidate the relationship between process and spatial pattern and depict habitat in terms of...Introduction:Incorporating information on animal behavior in resource-based predictive modeling(e.g.,occurrence mapping)can elucidate the relationship between process and spatial pattern and depict habitat in terms of its structure as well as its function.In this paper,we assigned location data on brood-rearing greater sage-grouse(Centrocercus urophasianus)to either within-patch(encamped)or between-patch(traveling)behavioral modes by estimating a movement-based relative displacement index.Objectives were to estimate and validate spatially explicit models of within-versus between-patch resource selection for application in habitat management and compare these models to a non-behaviorally adjusted model.Results:A single model,the vegetation and water resources model,was most plausible for both the encamped and traveling modes,including the non-behaviorally adjusted model.When encamped,sage-grouse selected for taller shrubs,avoided bare ground,and were closer to mesic areas.Traveling sage-grouse selected for greater litter cover and herbaceous vegetation.Preference for proximity to mesic areas was common to both encamped and traveling modes and to the non-behaviorally adjusted model.The non-behaviorally adjusted map was similar to the encamped model and validated well.However,we observed different selection patterns during traveling that could have been masked had behavioral state not been accounted for.Conclusions:Characterizing habitat that structured between-patch movement broadens our understanding of the habitat needs of brood-rearing sage-grouse,and the combined raster surface offers a reliable habitat management tool that is readily amenable to application by GIS users in efforts to focus sustainable landscape management.展开更多
由于现有协议的安全性为基于某种安全假设的计算安全,依赖于敌手的计算能力,因此,本文针对恶意敌手模型,使用矩阵伪装技术对方程的系数矩阵进行隐藏,结合矩阵的LU分解(lower-upper decomposition)算法,提出一种新的信息论安全外包求解...由于现有协议的安全性为基于某种安全假设的计算安全,依赖于敌手的计算能力,因此,本文针对恶意敌手模型,使用矩阵伪装技术对方程的系数矩阵进行隐藏,结合矩阵的LU分解(lower-upper decomposition)算法,提出一种新的信息论安全外包求解线性代数方程组(information-theoretically secure outsourcing of linear algebraic equations,ITS-OutsLAE)方法 .与之前的研究相比,在保持计算和通信复杂度与现有最优方案保持一致的同时,首次将方程组唯一解的安全性提升至信息论安全(完美保密).给出了形式化的安全性证明,并通过理论分析和实验证明了所提方法的实用性.展开更多
基金supported in part by the National Key R&D Program of China(No.2022YFB2902202)in part by the Fundamental Research Funds for the Central Universities(No.2242023K30034)+2 种基金in part by the National Natural Science Foundation of China(No.62171121,U22A2001),in part by the National Natural Science Foundation of China(No.62301144)in part by the National Natural Science Foundation of Jiangsu Province,China(No.BK20211160)in part by the Southeast University Startup Fund(No.4009012301)。
文摘Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.
文摘Two primary patterns of body size variation have been recorded in ectotherms in relation to latitudinal/altitudinal shifts. In some, body size increases with increasing latitude/altitude whereas, in others, body size decreases with increasing latitude/altitude. This clinal variation is generally assumed to be caused by local adaptation to environmental conditions however the selective variable(s) (temperature, humidity, diet quality, etc.) is still heavily debated. Here we investigate geographic variation in body size of dark and pale color morphs of males of the bush-cricket lsophya rizeensis collected from 15 locations along an elevation gradient ranging from 350 to 2 500 m. Using an information theoretical approach we evaluate the relative support of four different hypotheses (the temperature size rule, the moisture gradient hypothesis, the seasonal constraint hypothesis, and the primary productivity hypothesis) explaining body size variation along the altitudinal gradient. Body size variation in pale color morphs showed a curvilinear relationship with altitude while dark color morphs showed no variation in body size. Body size variation in pale color morphs was highly correlated with precipitation and temperature seasonality values thus giving strong support for the moisture gradient and seasonal constraint hypothesis. Our results reinforce the importance of gradients in humidity and seasonality over temperature in the creation of altitudinal body size clines and the role of selection for resistance to stress factors in the establishment of these clines. Whether a body size cline is observed or not might also depend on the phenotypic properties of the individuals, like coloration.
基金supported by the National Natural Science Foundation of China under Grant No. 61173157Strategy Pilot Project of Chinese Academy of Sciences under Grant No. XD06010702IIE's Cryptography Research Project
文摘We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack.
文摘Let S be the set of n coins,in which there are m counterfeit coins, heavier (or lighter) than the normals. How many weighings do we need to find the m fakes by a balance? Denote by g_m(n) the least number of weighings we need.
基金Project supported by the National Natural Science Foundation of China and the Natural Science Foundation of Guangdong Province.
文摘An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules for this code is a representation system for cosets of a certain subgroup in the projective transformation group.A special case is studied,i.e.the rational normal curves are the conies over finite fields.The representation system for the cosets which determines the set of encoding rules will be given.
基金Supported by the National Natural Science Foun-dation of China (60403005 ,60573026)
文摘The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoretic verifiable secret sharing over RSA (Rivest, Shamir, Adleman) modulus and give the rigorous security proof. It is shown how to distribute a secret among a group such that any set of k parties get no information about the secret. The presented scheme is generally applied to constructions of secure distributed multiplication and threshold or forward-secure signature protocols.
基金Supported by National Natural Science Foundation of China (Grant Nos.10571093 and 10871104)SRFDP of China (Grant No.20050055038)
文摘In this paper, through an information-theoretic approach, we construct estimations and confidence intervals of Z-functionals involving finite population and with the presence of auxiliary information. In particular, we give a method of estimating the variance of finite population with known mean. The modified estimates and confidence intervals for Z-functionals can adequately use the auxiliary information, at least not worse than what the standard ones do. A simulation study is presented to assess the performance of the modified estimates for the finite sample case.
基金Program from Chinese National Basic Research Program(2014CB954203)grants from the National Natural Science Foundation of China(31322010,31270753,31000286)the National Youth Top-notch Talent Support Program to J.D.and Fundamental Research Funds for Central Universities(lzujbky-2012-k23).
文摘Aims More data are needed about how genetic variation(GV)and envi-ronmental factors influence phenotypic variation within the natural populations of long-lived species with broad geographic distribu-tions.To fill this gap,we examined the correlations among envi-ronmental factors and phenotypic variation within and among 13 natural populations of Pinus tabulaeformis consisting of four demo-graphically distinct groups within the entire distributional range.Methods Using the Akaike’s information Criterion(AiC)model,we measured 12 morphological traits and constructed alternative candidate models for the relationships between each morphological trait and key climatic variables and genetic groups.We then compared the AiC weight for each candidate model to identify the best approximating model for ecogeographical variation of P.tabulaeformis.The partitioning of vari-ance was assessed subsequently by evaluating the independent vari-ables of the selected best models using partial redundancy analysis.Important Findings Significant phenotypic variation of the morphological traits was observed both within individual populations and among populations.Variation partition analyses showed that most of the phenotypic variation was co-determined by both GV and climatic factors.GV accounted for the largest proportion of reproductive trait variation,whereas local key climatic factors(i.e.actual evapotranspiration,AET)accounted for the largest proportion of phenotypic variation in the remaining investigated traits.Our results indicate that both genetic divergence and key environmental factors affect the phenotypic variation observed among populations of this species,and that reproductive and vegetative traits adaptively respond differently with respect to local environmental conditions.This partitioning of factors can inform those making predictions about phenotypic variation in response to future changes in climatic conditions(particularly those affecting AET).
基金Supported by the National Natural Science Foundation of China(No.61325018,61272379)the National High Technology Research and Development Program of China(No.2006AA04Z246)the Ministry of Education Science and Technology Innovation Engineering Major Cultivation Project of China(No.107053)
文摘An amplify-and-forward(AF) dual-hop relay is proposed for secure communication within Wyner s wiretap channel.Based on an information-theoretic formulation,the average secrecy rate is characterized when two legitimate partners communicate over a quasi-static fading channel.Theoretical analysis and simulation results show that both cooperative strategies of average power scaling(APS) and instantaneous power scaling(IPS) are proved to be able to achieve information-theoretic security,and eavesdropper is unable to decode any information.
文摘Introduction:Incorporating information on animal behavior in resource-based predictive modeling(e.g.,occurrence mapping)can elucidate the relationship between process and spatial pattern and depict habitat in terms of its structure as well as its function.In this paper,we assigned location data on brood-rearing greater sage-grouse(Centrocercus urophasianus)to either within-patch(encamped)or between-patch(traveling)behavioral modes by estimating a movement-based relative displacement index.Objectives were to estimate and validate spatially explicit models of within-versus between-patch resource selection for application in habitat management and compare these models to a non-behaviorally adjusted model.Results:A single model,the vegetation and water resources model,was most plausible for both the encamped and traveling modes,including the non-behaviorally adjusted model.When encamped,sage-grouse selected for taller shrubs,avoided bare ground,and were closer to mesic areas.Traveling sage-grouse selected for greater litter cover and herbaceous vegetation.Preference for proximity to mesic areas was common to both encamped and traveling modes and to the non-behaviorally adjusted model.The non-behaviorally adjusted map was similar to the encamped model and validated well.However,we observed different selection patterns during traveling that could have been masked had behavioral state not been accounted for.Conclusions:Characterizing habitat that structured between-patch movement broadens our understanding of the habitat needs of brood-rearing sage-grouse,and the combined raster surface offers a reliable habitat management tool that is readily amenable to application by GIS users in efforts to focus sustainable landscape management.
文摘由于现有协议的安全性为基于某种安全假设的计算安全,依赖于敌手的计算能力,因此,本文针对恶意敌手模型,使用矩阵伪装技术对方程的系数矩阵进行隐藏,结合矩阵的LU分解(lower-upper decomposition)算法,提出一种新的信息论安全外包求解线性代数方程组(information-theoretically secure outsourcing of linear algebraic equations,ITS-OutsLAE)方法 .与之前的研究相比,在保持计算和通信复杂度与现有最优方案保持一致的同时,首次将方程组唯一解的安全性提升至信息论安全(完美保密).给出了形式化的安全性证明,并通过理论分析和实验证明了所提方法的实用性.