39 research outputs found
Performance of Toria (Brassica campestrisvar. toria) on sulphur nutrition and soil test based nutrient management practice in farmers’ field of West-Bengal Himalayan range
An on-farm trial was conducted in the farmers’ field during 2013-14 and 2014-15 to assess the technology of application of sulphur on Toria (Brassica campestrisvar. toria)along with soil test based nutrient management practice under rain-fed condition at brown forest soil of the Himalayan range of West Bengal. The experiment was conducted at the seven villages namely Bong Busty, Charkhol, Sangsey, Bungkulung, Sakyong, Pudung, Didabling of Kalimpong district at an altitude ranged between 1210 m to 1300m . Significantly higher values of no. of primary branches (9.78); no. of siliquaplant-1 (82.12); no. of seeds siliqua-1 (35.51) as well as seed yield (1023 kg ha-1) were recorded with soil test based nutrient management practice along with soil application of sulphur (80%) @ 20kg ha-1as basal compared to the farmers’ practice. The soil application of sulphur and soil test based nutrient management practice also fetched higher return per rupee invested (1.61) compared to the other treatments. No remarkable change was observed in soil fertility status after two years of experimentation. As it was an adoptive trial with the participation of farmers, the necessity of soil test based nutrient management practice and application of sulphur have been well realized by the participating farmers
Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption
In this paper, we present Functional Encryption (FE) schemes for finite languages from standard static assumption, viz., \textit{Decisional Linear} (DLIN) assumption. These finite languages are described by Deterministic Finite Automatas (DFAs). Our first scheme is ciphertext-policy functional encryption (CP-FE), where a key \sk_w is labeled with a string over a fixed alphabet and a ciphertext \cipher_\amn is associated with a DFA \amn over the same alphabet . The key \sk_w can extract the message from the ciphertext \cipher_\amn if the DFA \amn accepts the string . This CP-FE scheme is constructed based on attribute-based encryption (ABE) structure of Okamoto-Takashima in Asiacrypt, 2012. To achieve the adaptive security, we put bounds on number of occurrences of any symbol in a string and in the set of transition tuples of a DFA. Due to this restriction, the size of key space (where the keys are indexed with strings) is reduced to finite. Hence, the functional scope of any DFA in our system can capture only finite language. Similarly, we obtain our second adaptively secure FE scheme in key-policy flavor from DLIN assumption. Both the schemes are shown to be secure in the standard model
Generic Conversions from CPA to CCA secure Functional Encryption
In 2004, Canetti-Halevi-Katz and later Boneh-Katz showed generic CCA-secure PKE constructions from a CPA-secure IBE. Goyal et al. in 2006 further extended the aforementioned idea implicitly to provide a specific CCA-secure KP-ABE with policies represented by monotone access trees. Later, Yamada et al. in 2011 generalized the CPA to CCA conversion to all those ABE, where the policies are represented by either monotone access trees (MAT) or monotone span programs (MSP), but not the others like sets of minimal sets. Moreover, the underlying CPA-secure constructions must satisfy one of the two features called key-delegation and verifiability. Along with ABE, many other different encryptions schemes, such as inner-product, hidden vector, spatial encryption schemes etc. can be studied under an unified framework, called functional encryption (FE), as introduced by Boneh-Sahai-Waters in 2011. The generic conversions, due to Yamada et al., can not be applied to all these functional encryption schemes. On the other hand, to the best of our knowledge, there is no known CCA-secure construction beyond ABE over MSP and MAT. This paper provides different ways of obtaining CCA-secure functional encryptions of almost all categories. In particular, we provide a generic conversion from a CPA-secure functional encryption into a CCA-secure functional encryption provided the underlying CPA-secure encryption scheme has either restricted delegation or verifiability feature. We observe that almost all functional encryption schemes have this feature. The KP-FE schemes of Waters (proposed in 2012) and Attrapadung (proposed in 2014) for regular languages do not possess the usual delegation property. However, they can be converted into corresponding CCA-secure schemes as they satisfy the restricted delegation
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
Attrapadung (Eurocrypt 2014) proposed a generic framework called pair encoding to simplify the design and proof of security of CPA-secure predicate encryption (PE) in composite order groups.
Later Attrapadung (Asiacrypt 2016) extended this idea in prime order groups.
Yamada et al. (PKC 2011, PKC 2012) and Nandi et al. (ePrint Archive: 2015/457, AAECC 2017) proposed generic conversion frameworks to achieve CCA-secure PE from CPA-secure PE provided the encryption schemes have properties like delegation or verifiability.
The delegation property is harder to achieve and verifiability based conversion degrades the decryption performance due to a large number of additional pairing evaluations.
Blömer et al. (CT-RSA 2016) proposed a direct fully CCA-secure predicate encryption in composite order groups but it was less efficient as it needed a large number of pairing evaluations to check ciphertext consistency.
As an alternative, Nandi et al. (ePrint Archive: 2015/955) proposed a direct conversion technique in composite order groups.
We extend the direct conversion technique of Nandi et al. in the prime order groups on the CPA-secure PE construction by Attrapadung (Asiacrypt 2016) and prove our scheme to be CCA-secure in a quite different manner.
Our first direct CCA-secure predicate encryption scheme requires exactly one additional ciphertext component and three additional units of pairing evaluation during decryption.
The second construction requires exactly three additional ciphertext components but needs only one additional unit pairing evaluation during decryption.
This is a significant improvement over conventional approach for CPA-to-CCA conversion in prime order groups
Effects of Withania somnifera Extract in Chronically Stressed Adults: A Randomized Controlled Trial.
BACKGROUND: Stress is a known causative factor in modulating cognitive health, which overall well-being and quality of life are dependent on. Long-term stress has been shown to disrupt the balance of the hypothalamic-pituitary-adrenal (HPA) axis. Adaptogens, such as Withania somnifera (ashwagandha), are commonly used in Ayurvedic medicine for stress relief and ameliorating HPA-axis dysfunction. The aim of this study was to support the role of a root and leaf water-extracted ashwagandha extract (WS) in stress reduction by confirming the lowest clinically validated dose for stress management (125 mg/day) in a dose-dependent clinical study in adults with self-reported high stress. METHODS: An 8-week, randomized, double-blinded, placebo-controlled study to compare the effects of three different WS extract doses (125, 250 and 500 mg) was performed. A total of 131 adults were enrolled, and 98 were included in the final analysis. Attenuation of chronic stress was measured using the 14-item Perceived Stress Scale (PSS) and biochemical-related stress parameters. RESULTS: We have shown that aqueous WS extract (roots and leaves) safely reduces mild to moderate chronic stress at doses of 125 mg, 250 mg, and 500 mg/day for 8 weeks. CONCLUSIONS: Our findings demonstrate the stress-reduction capabilities of this well-characterized aqueous extract of WS (root and leaf) at the low dose of 125 mg/day, in a dose-dependent manner, via the modulation of the HPA axis. TRIAL REGISTRATION: This study was registered with the Clinical Trials Registry-India (CTRI) with the registration number: CTRI/2019/11/022100
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption (ABE) and Attribute-Based Signature (ABS), where we have the message confidentiality and authenticity together. Since the signer privacy is captured in security of ABS, it is quite natural to expect that the signer privacy will also be preserved in ABSC. In this paper, first we propose an ABSC scheme which is \textit{weak existential unforgeable, IND-CCA2} secure in \textit{adaptive-predicates} attack and achieves \textit{signer privacy}. Secondly, by applying strongly unforgeable one-time signature (OTS), the above scheme is lifted to an ABSC scheme to attain \textit{strong existential unforgeability} in \textit{adaptive-predicates} model. Both the ABSC schemes are constructed on common setup, i.e the public parameters and key are same for both the encryption and signature modules. Our first construction is in the flavor of paradigm, except one extra component that will
be computed using both signature components and ciphertext components. The second proposed construction follows a new paradigm (extension of ), we call it ``Commit then Encrypt and Sign then Sign (). The last signature is done using a strong OTS scheme. Since the non-repudiation is achieved by paradigm, our systems also achieve the same
Signcryption in a Quantum World
This work studies signcryption of classical data in the quantum setting. Essentially, we investigate the quantum security of generic constructions of signcryption schemes based on three paradigms, viz., encrypt-then-sign (EtS), sign-then-encrypt (StE) and commit-then-encrypt-and-sign (CtE&S). For doing that we define the confidentiality and authenticity of signcryption for classical data both in insider and outsider models against quantum adversaries. In the insider model, we show that the quantum variants of the classical results hold in the quantum setting. However, for arguing authenticity in outsider model of StE and CtE&S paradigms, we need to consider an intermediate setting in which the adversary is given quantum access to unsigncryption oracle but classical access to signcryption oracle. In two-user outsider model, as in the classical setting, we show that post-quantum CPA security of the base encryption scheme is amplified in the EtS paradigm if the base signature scheme satisfies a stronger definition. We prove an analogous result in the StE paradigm. Interestingly, in the multi-user setting, our results strengthen the known classical results. Furthermore, our results for the EtS and StE paradigms in the two-user outsider model also extend to the setting of authenticated encryption. Finally, we briefly discuss concrete instantiations in various paradigms utilizing some available candidates of quantum secure encryption and signature schemes
On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives
Recently Attrapadung (Eurocrypt 2014) proposed a generic framework for fully (adaptively) secure predicate encryption (PE) based on a new primitive, called pair encodings. The author shows that if the underlying pair encoding scheme is either perfectly secure or computationally (doubly-selectively) secure, then the PE scheme will be fully secure. Although the pair encodings were solely introduced
for PE, we show that these can also be used to construct predicate signatures, a signature analogue of PE. More precisely, we propose a generic construction for predicate signature (PS) from the pair
encoding schemes. Our construction provides the signer privacy, and unforgeability in the adaptive-predicate model. Thereafter, we instantiate many PS schemes with new results, e.g., the first practical PS schemes for regular languages, the first attribute-based signature (ABS) scheme with constant-size signatures in adaptive-predicate model, the unbounded ABS with large universes in key-policy flavor, etc.
Following the CCA conversions of Yamada et al. (PKC 2011, 2012) and Nandi et al. (ePrint Archive: 2015/457), one can have CCA-secure PE from CPA-secure PE if the primitive PE has either verifiability or delegation. We show that the fully secure CPA-construction of Attrapadung possesses the verifiability. The aforesaid approach degrades the performance of the resultant CCA-secure PE scheme. As an alternative, we provide a direct fully secure CCA-construction for PE from the pair encoding scheme. This costs an extra computation of group element in encryption and three extra pairing computations in decryption as compared to the CPA-construction of Attrapadung.
The predicate signcryption (PSC) is a super class of the existing class, the attribute-based signcryption (ABSC), where the confidentiality, unforgeability and signer privacy are well preserved. By combining the proposed frameworks for PS and PE, we provide a generic construction for PSC from the pair encodings. It achieves the perfect privacy, and the strong unforgeability and CCA security in the adaptive-predicates model. The construction has the support of combined-setup, where the distributions of public parameters and keys in the underlying signature and encryption schemes are identical. The proposed PSC provides many new results, e.g., the first PSC schemes for regular languages, the first ABSC with constant-size signcryptions and constant-size keys respectively, the unbounded ABSC with large universes in adaptive-predicates model, etc
Predicate signatures from pair encodings via dual system proof technique
Abstract
Recently, Attrapadung (Eurocrypt 2014) proposed a generic framework for fully (adaptively) secure predicate encryption (PE) based on a new primitive, called pair encodings.
The author shows that if the underlying pair encoding scheme is either perfectly secure or computationally (doubly-selectively) secure, then the PE scheme will be fully secure.
Although the pair encodings were solely introduced for PE, we show that these can also be used to construct predicate signatures, a signature analogue of PE.
More precisely, we propose a generic construction of predicate signature (PS) from pair encoding schemes.
Our construction provides unconditional signer privacy, and unforgeability in the adaptive model.
Thereafter, we instantiate many PS schemes with new results, e.g., the first practical PS schemes for regular languages, the first attribute-based signature (ABS) scheme with constant-size signatures in the adaptive model, unbounded ABS with large universes in key-policy flavor, etc.</jats:p
