Processing math: 100%
Review

The epigenetics of diabetes, obesity, overweight and cardiovascular disease

  • The objectives of this review were once to understand the roles of the epigenetics mechanism in different types of diabetes, obesity, overweight, and cardiovascular disease. Epigenetics represents a phenomenon of change heritable phenotypic expression of genetic records taking place except changes in DNA sequence. Epigenetic modifications can have an impact on a whole of metabolic disease with the aid of specific alteration of candidate genes based totally on the change of the target genes. In this review, I summarized the new findings in DNA methylation, histone modifications in each type of diabetes (type 1 and type 2), obesity, overweight, and cardiovascular disease. The involvement of histone alterations and DNA methylation in the development of metabolic diseases is now widely accepted recently many novel genes have been demonstrated that has roles in diabetes pathway and it can be used for detection prediabetic; however Over the modern-day years, mass spectrometry-based proteomics techniques positioned and mapped one-of a kind range of histone modifications linking obesity and metabolic diseases. The main point of these changes is rapidly growing; however, their points and roles in obesity are no longer properly understood in obesity. Furthermore, epigenetic seen in cardiovascular treatment revealed a massive quantity of modifications affecting the improvement and development of cardiovascular disease. In addition, epigenetics are moreover involved in cardiovascular risk factors such as smoking. The aberrant epigenetic mechanisms that make a contribution to cardiovascular disease.

    Citation: Harem Othman Smail. The epigenetics of diabetes, obesity, overweight and cardiovascular disease[J]. AIMS Genetics, 2019, 6(3): 36-45. doi: 10.3934/genet.2019.3.36

    Related Papers:

    [1] Lina Zhang, Jing Zhang, Jiaqi Sun, Qingpeng Chen . A global progressive image secret sharing scheme under multi-group joint management. Mathematical Biosciences and Engineering, 2024, 21(1): 1286-1304. doi: 10.3934/mbe.2024055
    [2] Xuehu Yan, Longlong Li, Lintao Liu, Yuliang Lu, Xianhua Song . Ramp secret image sharing. Mathematical Biosciences and Engineering, 2019, 16(5): 4433-4455. doi: 10.3934/mbe.2019221
    [3] Xiaoping Li, Yanjun Liu, Hefeng Chen, Chin-Chen Chang . A novel secret sharing scheme using multiple share images. Mathematical Biosciences and Engineering, 2019, 16(6): 6350-6366. doi: 10.3934/mbe.2019317
    [4] Feng Liu, Xuehu Yan, Lintao Liu, Yuliang Lu, Longdan Tan . Weighted visual secret sharing with multiple decryptions and lossless recovery. Mathematical Biosciences and Engineering, 2019, 16(5): 5750-5764. doi: 10.3934/mbe.2019287
    [5] Li-na Zhang, Chen-yu Cui, Xiao-yu Zhang, Wei Wu . Adaptive visual cryptography scheme design based on QR codes. Mathematical Biosciences and Engineering, 2022, 19(12): 12160-12179. doi: 10.3934/mbe.2022566
    [6] Song Wan, Guozheng Yang, Lanlan Qi, Longlong Li , Xuehu Yan, Yuliang Lu . Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Mathematical Biosciences and Engineering, 2019, 16(6): 6367-6385. doi: 10.3934/mbe.2019318
    [7] Li-na Zhang, Jia-qi Sun, Xiao-yu Zhang, Qing-peng Chen, Jing Zhang . Two-level QR code scheme based on region matrix image secret sharing algorithm. Mathematical Biosciences and Engineering, 2023, 20(9): 16678-16704. doi: 10.3934/mbe.2023743
    [8] Ching-Chun Chang, Chang-Tsun Li . Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems. Mathematical Biosciences and Engineering, 2019, 16(5): 3367-3381. doi: 10.3934/mbe.2019168
    [9] Yanjun Liu, Chin-Chen Chang, Peng-Cheng Huang . Security protection using two different image shadows with authentication. Mathematical Biosciences and Engineering, 2019, 16(4): 1914-1932. doi: 10.3934/mbe.2019093
    [10] Guozheng Yang, Lintao Liu, Xuehu Yan . A compressed secret image sharing method with shadow image verification capability. Mathematical Biosciences and Engineering, 2020, 17(4): 4295-4316. doi: 10.3934/mbe.2020237
  • The objectives of this review were once to understand the roles of the epigenetics mechanism in different types of diabetes, obesity, overweight, and cardiovascular disease. Epigenetics represents a phenomenon of change heritable phenotypic expression of genetic records taking place except changes in DNA sequence. Epigenetic modifications can have an impact on a whole of metabolic disease with the aid of specific alteration of candidate genes based totally on the change of the target genes. In this review, I summarized the new findings in DNA methylation, histone modifications in each type of diabetes (type 1 and type 2), obesity, overweight, and cardiovascular disease. The involvement of histone alterations and DNA methylation in the development of metabolic diseases is now widely accepted recently many novel genes have been demonstrated that has roles in diabetes pathway and it can be used for detection prediabetic; however Over the modern-day years, mass spectrometry-based proteomics techniques positioned and mapped one-of a kind range of histone modifications linking obesity and metabolic diseases. The main point of these changes is rapidly growing; however, their points and roles in obesity are no longer properly understood in obesity. Furthermore, epigenetic seen in cardiovascular treatment revealed a massive quantity of modifications affecting the improvement and development of cardiovascular disease. In addition, epigenetics are moreover involved in cardiovascular risk factors such as smoking. The aberrant epigenetic mechanisms that make a contribution to cardiovascular disease.


    Online collaboration among multiple entities becomes a very popular application nowadays due to automatic data backup and cross-regional group collaboration requirements in cloud computing. The collaborative and sharing nature of data storage in the cloud demands greater group collaborations [1,2]. However, each participating entity would like to protect its privileges before outsourcing its data to the cloud servers. One feasible solution is to use secret sharing (SS) to enable group key management in the distributed fashion, so that the distrusting entities with conflicting interest can cooperate honestly and securely. In a $ (k, n) $-SS scheme, the secret is shared among a number of participants. Due to the flexibility and convenience of cloud computing, the participants often need to participant in different SS sharing systems in different applications. If we just use the traditional SS scheme to design the management system, a participant joining in multiple management systems, called multi-privilege participant, will need to store multiple shares in each application, which is inconvenient. Consider the following scenario concerning data sharing.

    With the development of big data and artificial intelligence (AI), data with multiple owners are often needed to be agammaegated to accomplish an important task by using AI techniques. For example, the financial datas from cities A, B and C are running in a cooperated and distributed manner to analyze an economic development index as illustrated in Figure 1. The financial data, traffic data, population data of city A is used to analyze the urban construction planning. The financial data from city A is used in different group collaborative tasks. A convenient and secure data management system is the first consideration for such confidential data against untrusted cloud. This phenomenon has become more common in cloud data collaboration among different data owners. The data owner of city A must carry two shares to manage the data in different collaborative tasks. If a data owner is involved in a large number of data collaborative tasks, he or she needs to keep many shares, which can be a burden.

    Figure 1.  Data sharing scenario.

    Therefore, it is desirable to have a SS scheme such that each multi-privilege participant needs to keep only one share in its related tasks. Not only it will be more convenient for the participants, but also the multiple key management systems can be made more practical. In this paper, we just propose such a scheme based on the Chinese Remainder Theorem (CRT).

    The SS schemes were first introduced by Shamir [3] and Blakley [4] independently to share a secret among a group of $ n $ participants. It allows the secret to be reconstructed when more than the threshold $ k $ of these participants are working together, but less participants cannot recover the secret. Thanks to its high level of security protection and low computatonal requirements, SS schemes have been used in various applications, such as human-verifiable authentication [5], group collaboration [6,7], and secure multiparty computation [8]. Nowadays, with the popularity of cloud computing, SS schemes have emerged as an important technology for secure data storage in the cloud, secure group management [9,10,11], and reputation adjustment in social network [12,13].

    In a $ (k, n) $ SS scheme, the regular participant can obtain only one share. The multi-privilege participant who has more privileges will receive multiple shares, which is inconvenient. In cloud computing environments, group collaboration between two or more management systems is widely used in the era of shared economy [14]. Consider the following scenario regarding group collaboration: a participant joins in multiple reputation systems in the social network and she will have multiple reputation values using secret sharing schemes [13,12,15]. A collaborative reputation management system will allow this multi-privilege participant to share her reputation in different platforms. In general, the above scenarios can be described as a cryptographic model: a multiple secret sharing scheme is designed to share multiple secrets independently, while the participants and the secrets have the many-to-many relationships. Inspired by the practical problems arisen in the above scenarios, it is desirable to design a scheme to facilitate the group collaboration among different threshold secret sharing schemes so that each multi-privilege participant only needs to keep one share.

    How to collaborate between threshold secret sharing schemes was first proposed by [16] to solve bank managers with multiple privileges problem. In their scheme, if $ u $ participants are involved in both schemes, each of these $ u $ multi-privilege participant keeps only one share by constructing polynomials with common solutions. Here we call the participants who are involved in multiple SS schemes as multi-privilege participants, and their shares are called multi-privilege shares. Each secret can be uniquely reconstructed by Lagrange interpolation, but it requires $ O(k\log^2k) $ operations. The collaborative visual cryptographic scheme was formulated as an integer linear programming problem that minimizes pixel expansion under the corresponding security and contrast constraints in [11]. Each multi-privilege participant takes one share and can reconstruct the secret together with the other participants when they belong to the designated qualified subsets family. The secret can be visually recovered without any computation but with lower quality. The scheme has strict constraints for the participant intersection [16]. The collaborative visual scheme will suffer from severe pixel expansion problem. Hence, it will become impractical when the participant intersections are complex [11]. Since a group collaboration in the cloud may involve flexible and complex computations, participant intersections are also complex. Therefore, it is desirable to construct a collaborative secret sharing (CSS) scheme to allow complex participant intersections and to recover the secret perfectly with lower computational complexity.

    Another important mathematical model to address the threshold SS scheme is the Chinese Remainder Theorem (CRT), which requires only $ O(k) $ operations in the secret reconstruction phase [17,18]. The scheme in [18] is proved by [20,24,21,19] having asymptotically perfect security and is practical due to its high efficiency and simple construction. The CRT has been extensively used in various SS schemes and has produced abundant research results. Shares in the $ (k, n) $ SS scheme based on the CRT form a redundant representation of the secret, which provides a number-theoretic construction of an "error-correcting code" in [21]. The threshold changeable secret sharing scheme in [22] is a lattice-based "error-correction" algorithm that can be seen as an application of the algorithm in 'Noisy Chinese Remaindering in the Lee Norm' [23]. It is accomplished based on CRT by adding noise to the shares. Intensive analysis of the security was presented in [24], and the prime sequence generation algorithm for the Asmuth-Bloom scheme was proposed for the first time. A multi-level threshold scheme [25] was constructed by using the CRT. Harn et al. devised the general secret sharing scheme [26] based on the CRT with Boolean logic and integer linear/non-integer programming. Drǎgan and Ţiplea proposed the distributive weighted threshold SS scheme [27], which has perfect zero-knowledge. In order to decrease the recovery complexity, we consider to use the CRT to construct the collaborative secret sharing scheme in this paper.

    Inspired by the previous works in [16] and [18], we present a novel scheme to solve the collaboration problem based on CRT, which can reconstruct the secret with the same security as in scheme [18]. The computational complexity is only $ O(k) $ in the secret reconstruction phase. Our method avoids high complexity, and restrictive participant intersections of [16], and the low recovery quality and extremely large pixel expansion of [11]. The compromise is that our scheme needs to publish $ n $ moduli as the public parameters comparable with one parameter in [16,11]. The advantage of its single share and lower computation complexity make our approach ideal for high-through processing applications. It will provide an efficient outsourced computation platform which will facilitate the group collaboration among different secret-data owners. The proposed scheme can be used as a building block to handle different types of group collaborations.

    In summary, the contributions of this paper are summarized as follows. A collaborative secret sharing scheme framework is proposed, in which the Chinese Remainder Theorem is used to lower the computational complexity. It can fully achieve the group collaboration functionality and security requirements. This contributes to a better performance than comparative state-of-the-art polynomial methods. Complex participant intersections are designed so that each multi-privilege participant just keeps one share even if multiple secrets are shared. Our approach to building CSS scheme may have some independent interests, and it may find applications in related cryptographic protocols.

    The remainder of this paper is organized as follows. Section 2 gives the definition of SS scheme using entropy terms, the preliminaries of the CRT, the SS scheme based on the CRT [18]. Section 3 gives the definition of collaboration between two schemes and presents the algorithm design. Collaboration among three or more schemes is different from the collaboration between two schemes in terms of participant intersection and the presentation format, which is addressed in the same section. The correctness and security are analysed in Section 4, followed by the comparison of performance between the proposed scheme and the schemes in [16] and [11]. One example is presented to demonstrate the construction process. Finally, conclusions are drawn in Section 5.

    In this section, we review the key building blocks, including the definition of SS scheme, the Chinese Remainder Theorem and Asmuth-Bloom's scheme used in our scheme.

    SS scheme is an important key management technique by decomposing a secret into input shares. The $ (k, n) $ secret sharing scheme is the common used SS schemes, where $ n $ is the number of participants and $ k(\leq n) $ is called threshold, which is pre-determined according to the security policy or the adversary model. The scheme has perfect security if participants not belonging to the access structure obtain no information about the secret. The access structure refers to the qualified subset holding at least $ k $ shares which can recover the secret.

    Let $ \mathbb {P} = \{P_1, \cdots, P_n\} $ be a set of $ n $ participants, $ S\subseteq \{0, 1\}^{x} $ be a finite set of secrets, called the secret-domain, and $ R $ be a set of random strings. $ H(\cdot) $ stands for the Shannon entropy and $ H(\cdot|\cdot) $ denotes the conditional entropy. A secret sharing scheme over $ \mathbb {P} $ is a mapping $ \Pi: S\times R\rightarrow S_1\times \cdots \times S_n $, where $ S_i $ is called the share-domain of $ P_i $. Dealer shares a secret $ s\in S $ among the participants according to $ \Pi $ by first sampling a random string $ r\in R $, computing the shares $ (S_1, \cdots, S_n) $, and then privately communicating each share $ S_i $ to $ P_i $. For any subset $ A\in \mathbb {P} $, $ S_A $ denotes the set of shares held by all participants in $ A $. There are multiple forms of definitions for $ (k, n) $ SS scheme. From the information theory point of view, its definition is widely used to demonstrate its performance. In present study, we adopt the definition from [28].

    Definition 2.1. (Secret Sharing Scheme [28]). A $ (k, n) $ threshold secret sharing scheme over a participant set $ \mathbb {P} $ is a secret sharing scheme $ \Pi: S\times R\rightarrow S_1\times \cdots\times S_n $ satisfying the following two conditions:

    1. for all $ A\subseteq \mathbb {P} $ and $ |A|\geq k $, $ H(S|S_A) = 0 $;

    2. for all $ A\subseteq \mathbb {P} $ and $ |A| < k $, $ 0 < H(S|S_A)\leq H(S) $.

    A scheme is called perfect if $ H(S|S_A) = H(S) $ holds for all $ A\subseteq \mathbb {P} $ and $ |A| < k $. A scheme is called asymptotically perfect if for all $ \epsilon > 0 $, there exists $ x_0\geq 0 $ such that for all $ A\subseteq \mathbb {P} $ with $ x\geq x_0 $, we have that

    $ \bigtriangleup H = |H(S)-H(S|S_A)|\leq \epsilon $

    holds for all $ |A| < k $ (see the definition 4 in section 2 [20]).

    Theorem 1. (Chinese Remainder Theorem [30]). If $ p_1, p_2, \ldots, p_k $ are pairewise coprime positive integers, then the following equations of congruence

    $ {SS1modp1,SS2modp2,,SSkmodpk,
    $
    (2.1)

    have a unique solution

    $ Ski=1PpiSiyimodP,
    $
    (2.2)

    where $ P = \prod\limits_{i = 1}^{k} p_i $, $ \frac{P}{p_i} y_i\equiv 1\bmod p_i $, and "$ \equiv $" denotes the relation of congruence.

    The CRT states that a positive integer $ S $ is uniquely specified by its remainder modulo $ k $ relatively prime integers $ p_1 $, $ p_2 $, $ \cdots $, $ p_k $, provided $ S < \prod\limits_{i = 1}^{k} p_i $. The CRT has been used in RSA decryption to accelerate the decryption process [30]. It is also well known in communication applications as error-correction codes [30] and image encryption [31]. The CRT can also be used to design various SS schemes [18,17,22,27,26,25,29]. The SS scheme based on CRT uses a special sequence of integers to guarantee the security and recovery of the secret. In our scheme, we use the CRT to design a CSS scheme, which can be seen as an extended application of CRT. In the next subsections, we will review the well-known SS scheme [18] based on the CRT.

    The SS schemes based on the CRT were designed by Mignotte [17] and Asmuth, Bloom [18], respectively. The SS scheme uses a special increasing sequence of pairwise coprime integers satisfying formula (2.3) to achieve asymptotically perfect security [18] and is widely used as the fundamental scheme to construct related SS schemes [22,25,26,27]. The Asmuth-Bloom SS scheme is given in the following.

    Distribution phase

    1. Select relatively prime integers $ p_0 < p_1 < \cdots < p_n $, where $ p_0 $ is a large secure prime, and the $ n+1 $ primes satisfy the following relationship

    $ ki=1pi>p0k1i=1pni+1.
    $
    (2.3)

    2. The dealer selects a secret $ s\in \mathbb{Z}_{p_0} $ and computes $ S = s+\alpha\cdot p_0 $, where $ \alpha $ is a random positive integer satisfying the condition $ \prod\limits_{i = 1}^{k-1}p_{n-i+1} < S < \prod\limits_{i = 1}^{k}p_i $ (This formula is enhanced in security by Harn and Fu in [25] from $ 0 < S < \prod\limits_{i = 1}^{k}p_i $ in [18]).

    3. The share for participant $ i $ is $ S_i\equiv S\bmod p_i $, $ i\in\{1, 2, \ldots, n\} $.

    Reconstruction phase

    1. Let $ A $ be the participant set that reconstructs the sharing secret with $ k $ or more participants. The participants send their shares to the combiner secretly.

    2. The combiner computes

    $ S\equiv\sum\limits_{i\in A}S_i P_{A\backslash \{i\}}' P_{A\backslash \{i\}}\bmod P_A $

    and obtains secret $ s $ by $ s\equiv S \bmod\; p_0 $. Set $ P_A = \prod\limits_{i\in A}p_i $ and $ P_{A\backslash \{i\}} = \prod\limits_{\substack{j\in A, \\j\neq i}}p_j $. $ P_{A\backslash \{i\}}' $ is the multiplicative inverse of $ P_{A\backslash \{i\}} $ in $ \mathbb{Z}_{p_i} $, which means that we have $ P_{A\backslash \{i\} }'P_{A\backslash \{i\}}\equiv1\bmod p_i $.

    This section first presents the collaboration between two SS schemes in which each multi-privilege participant holds only one share. Then, the collaboration among more SS schemes is constructed. We assume each scheme is constructed by the trusted third party. We call it the dealer. Different dealers are honest to transfer the necessary information and will not collude with any participants. In this paper, we emphasize on the basic model construction.

    Assume two secrets $ s_1 $ and $ s_2 $ are concealed in a $ (k_1, n_1) $ scheme among participants in the set $ \mathbb{P}_1 = \big\{P_1^{1}, \ldots, P_{n_1}^{1}\big\} $ and a $ (k_2, n_2) $ scheme among participant set $ \mathbb{P}_2 = \big\{P_1^{2}, \ldots, P_{n_2}^{2}\big\} $ separately, where $ k_1, n_1, k_2, n_2\in \mathbb{Z}^{+} $. The multi-privilege participant set is denoted as $ \text{U} = \mathbb{P}_2\bigcap\mathbb{P}_1 = \big\{P_1^{2, 1}, \ldots, P_{u}^{2, 1}\big\} $ with $ |\text{U}| = u $, the three values $ u $, $ k_1 $ and $ k_2 $ are not equal. The collaborative scheme between two SS schemes is denoted as a $ ((k_1, n_1); (k_2, n_2)) $-CSS scheme with $ \text{U} $. In order to protect each shared secret against colluding attacks, we generally require $ u < \min\{k_1, k_2\} $. It means that the recovery of each secret requires at least one internal participant who doesn't participant in any other SS scheme. A formal definition of the $ ((k_1, n_1); (k_2, n_2)) $-CSS scheme with $ \text{U} $ is given below.

    Definition 2 A $ (k_1, n_1) $-SS scheme with participant set $ \mathbb{P}_1 = \big\{P_1^{1}, \ldots, P_{n_1}^{1}\big\} $ to share a secret $ s_1 $ and a $ (k_2, n_2) $-SS scheme with participant set $ \mathbb{P}_2 = \big\{P_1^{2}, \ldots, P_{n_2}^{2}\big\} $ to share a secret $ s_2 $ constitute a $ ((k_1, n_1); (k_2, n_2)) $-CSS scheme with $ \text{U} $, where $ \text{U} = \mathbb{P}_2\bigcap\mathbb{P}_1 = \big\{P_1^{2, 1}, \ldots, P_{u}^{2, 1}\big\} $ and $ |\text{U}| = u $ if the following two conditions are satisfied:

    1. for all $ A\subseteq \mathbb{P}_1 $ and $ |A|\geq k_1 $, $ H(s_1|S_A) = 0 $; for all $ A\subseteq \mathbb{P}_2 $ and $ |A|\geq k_2 $, $ H(s_2|S_A) = 0 $;

    2. for all $ A\subseteq \mathbb{P}_1\bigcup \mathbb{P}_2 $ and $ |A\bigcap\mathbb{P}_1| < k_1 $, $ 0 < H(s_1|S_A)\leq H(s_1) $; for all $ A\subseteq \mathbb{P}_1\bigcup \mathbb{P}_2 $ and $ |A\bigcap\mathbb{P}_2| < k_2 $, $ 0 < H(s_2|S_A)\leq H(s_2) $.

    The first condition ensures that each secret can be revealed correctly by its authorized subsets. The second condition prevents unauthorized subsets from collusively revealing the secret. When the equality holds in the second condition, the $ ((k_1, n_1); (k_2, n_2)) $-CSS scheme with $ \text{U} $ has perfect security. It is called asymptotically perfect if for all $ \epsilon > 0 $, there exists $ x_0\geq 0 $ such that for all $ A\subseteq \mathbb{P}_1\bigcup \mathbb{P}_2 $ with $ x\geq x_0 $, we have that

    $ \bigtriangleup H = |H(s_i)-H(s_i|S_A)|\leq \epsilon $

    holds for all $ |A\bigcap\mathbb{P}_i| < k_i $, $ i\in\{1, 2\} $.

    Since a $ ((k_1, n_1) $; $ (k_2, n_2)) $-CSS scheme with $ \text{U} $ is a collaborative scheme, we assume that the $ (k_1, n_1) $ scheme is constructed first and then the multi-privilege shares are passed on to the dealer of the $ (k_2, n_2) $ scheme. Each $ (k_i, n_i) $ is an independent Asmuth-Bloom scheme, in addition to satisfying the collaborative conditions. The proposed $ ((k_1, n_1) $; $ (k_2, n_2)) $-CSS scheme with $ \text{U} $ is presented in Scheme 1.

    Scheme 1 The proposed $ ((k_1, n_1);(k_2, n_2)) $-CSS scheme with $ \text{U} $

    Distribution phase

    1. Dealer 1 chooses a large prime number $ p_0 $ and a sequence of pairwise coprime positive integers

    $ p_0 \lt p_1 \lt p_2 \lt \cdots \lt p_{n_1} $

    such that $ \prod\limits_{i = 1}^{k_1}p_i > p_0\prod\limits_{i = 1}^{k_1-1}p_{n-i+1} $, where $ \gcd(p_i, p_j) = 1 $, $ i\neq j $ for $ i, j\in\{1, 2, \ldots, n_1\} $.

    2. The dealer selects a secret $ s_1 $ and a random integer $ \alpha_1 $, and computes the secret related value $ S_1 = s_1+\alpha_1 p_0 $ such that $ \prod\limits_{i = 1}^{k_1-1}p_{n-i+1} < S_1 < \prod\limits_{i = 1}^{k_1}p_i $.

    3. Shares for the participants in $ \mathbb{P}_1 $ are generated by

    $ Si,1S1modpi
    $

    for $ i\in\{1, 2, \ldots, n_1\} $ and are sent to them secretly. Dealer 1 chooses the $ u $ multi-privilege shares from the $ n_1 $ shares, assuming $ s_{1, 1} $, $ s_{2, 1} $, $ \ldots $, $ s_{u, 1} $ are chosen, and passes them to Dealer 2.

    4. Dealer 2 selects a secure large prime number $ q_0 $ and a sequence of pairwise coprime positive integers

    $ q_0 \lt q_1 \lt q_2 \lt \cdots \lt q_{n_2} $

    such that $ \prod\limits_{i = 1}^{k_2}q_i > q_0\prod\limits_{i = 1}^{k_2-1}q_{n-i+1} $ and $ S_{i, 1} < q_{i} $ for $ i\in\{1, 2, \ldots, u\} $, where $ \gcd(q_i, q_j) = 1 $, $ i\neq j $ for $ i, j\in\{1, 2, \ldots, n_2\} $. Such process will maintain the validity of the multi-privilege shares.

    5. Dealer 2 chooses the secret $ s_2\in \mathbb{Z}_{q_0} $. Here, we assume that the $ u $ multi-privilege shares are also the first $ u $ shares of the $ (k_2, n_2) $ SS scheme. The dealer selects a suitable random integer $ \alpha_2 $ and computes the secret related value $ S_2 = s_2+\alpha_2 q_0 $ such that $ \prod\limits_{i = 1}^{k_2-1}q_{n-i+1} < S_2 < \prod\limits_{i = 1}^{k_2}q_i $. By combining the conditions of the multi-privilege shares, we can determine $ \alpha_2 $ by:

    $ {s2S2modq0,S1,2(=S1,1)S2modq1,,Su,2(=Su,1)S2modqu.
    $
    (3.1)

    The secret related value $ S_2 $ is derived by using (2.2) and then $ \alpha_2 $ can be derived, which is specified in Remark 1.

    6. The shares for the participants in $ \mathbb{P}_2 $ are generated as

    $ Si,2S2modqi
    $

    for $ i = u+1, 2, \ldots, n_2 $, and are delivered secretly to them.

    Reconstruction phase

    1. Given any $ k_1 $ shares of $ \mathbb{P}_1 $, such as $ S_{i_1, 1} $, $ \ldots $, $ S_{i_{k_1}, 1} $, we can find the secret related value $ S_1 $ according to the CRT by using (2.2) and compute the secret $ s_1\equiv S_1\bmod p_{0} $.

    2. Similarly, given any $ k_2 $ shares of $ \mathbb{P}_2 $, for example $ S_{i_1, 2} $, $ \ldots $, $ S_{i_{k_2}, 2} $, the secret related value $ S_2 $ can be computed according to the CRT by using (2.2), and the secret is obtained by $ s_2\equiv S_2\bmod q_{0} $.

    Remark 1. Step $ 5 $ of Scheme $ 1 $ is important for the CSS construction. It allows each multi-privilege participant to take only one share to participant multiple SS schemes. Here we show how to determine the secret related value $ S_2 $. A unique integer $ w\in\Bigg(\prod\limits_{i = 0}^{u-1}q_{n-i+1}, \prod\limits_{i = 0}^{u}q_i\Bigg] $ can be determined from (3.1) according to the CRT by using (2.2). We rewrite it in the form $ w = s_2+yq_0\in\Bigg(\prod\limits_{i = 0}^{u-1}q_{n-i+1}, \prod\limits_{i = 0}^{u}q_i\Bigg] $ and calculate the unique integer $ y $. Then we randomly choose $ x $ such that $ S_2 = w+xq_0q_1\ldots q_u\in\Bigg(\prod\limits_{i = 1}^{k_2-1}q_{n-i+1}, \prod\limits_{i = 1}^{k_2}q_i\Bigg] $, this leads to $ \alpha_2 = y+xq_1\ldots q_u $ since $ S_2 = s_2+\alpha_2q_0 $. Because $ y $ is uniquely determined and $ x $ has multiple random candidates by the above conditions, $ \alpha_2 $ has the same random choices as $ x $.

    In reality, Scheme 1 cannot be used when $ u = k_1 = k_2 $. In reality, $ u = k_1 = k_2 $ is not desirable from a security point of view since the $ u $ multi-privilege participants are not pure internal participants that they may collude to recover the secret without the authorization of the pure internal participants. It is safer if no more than $ u $ participants working together with at least one internal participant should be required to reconstruct the secret, i.e., $ u < k_1 $ and $ u < k_2 $.

    This subsection discusses cases where three or more threshold schemes collaborate with each other. Each dealer is in charge of one secret and distributes shares to related participants. The participant sets may overlap because the possibility of participants involving in multiple group collaboration is high. Under such circumstance, there may be common participants in any two schemes. The common participants means the multi-privilege participants. We now give an example for the collaboration among three SS schemes.

    Example 1. Consider three schemes, a $ (3, 5) $ scheme to share $ s_1 $, a $ (4, 6) $ scheme to protect $ s_2 $ and a $ (5, 7) $ scheme for $ s_3 $. Their participants are denoted as $ A = \{A_1 $, $ A_2 $, $ A_3 $, $ A_4 $, $ A_5\} $, $ B = \{B_1 $, $ B_2 $, $ B_3 $, $ B_4 $, $ B_5 $, $ B_6\} $ and $ C $ = $ \{C_1 $, $ C_2 $, $ C_3 $, $ C_4 $, $ C_5 $, $ C_6 $, $ C_7\} $, respectively. The common participants may appear in different subsets of intersection of $ A $ and $ B $ and $ C $. The basic intersections are shown in Figure 1 and depicted as four cases.

    Case 1: The common participants occur in $ A\bigcap B\bigcap C $. $ A_1 $ and $ A_2 $ are the common participants involved in all three schemes, i.e., $ A_1 = B_1 = C_1 $, $ A_2 = B_2 = C_2 $. It is secure from the point of view of $ s_i $, $ i = 1, 2, 3 $, since none of the other schemes or dealers can reveal the secret of $ s_i $, $ i = 1, 2, 3 $. A diagram is given in Figure 2.(a).

    Figure 2.  The multi-privilege participants appear.

    Case 2: The common participants occur in $ A\bigcap B $. When $ A_1 $ and $ A_2 $ are in $ A\bigcap B $, it is secure in terms of $ s_1 $ and $ s_2 $ (Figure 2.(b)).

    Case 3: The common participants occur in $ B\bigcap C $. When $ B_1 $ and $ B_2 $ are in $ B\bigcap C $, it is secure in terms of $ s_2 $ and $ s_3 $ (Figure 2.(c)).

    Case 4: The common participants occur in $ C\bigcap A $. When $ A_1 $ and $ A_2 $ are in $ C\bigcap A $, it is secure in terms of $ s_1 $ and $ s_3 $ (Figure 2.(d)).

    In fact, the common participants may occur in any combination of the above four cases. In different intersection cases, we need to consider different share intersections. This inspires us to propose a new method to define the participant set that the intersections can be seen clearly. For collaboration among $ l $ SS schemes, we define the participant set for each $ (k_i, n_i) $ scheme as $ \mathbb{P}_i = \big\{p_1^{i}, \ldots, p_{n_i}^{i}\big\} $, and its access structure is $ \Gamma_i = \{U\subseteq \mathbb{P}_i, |U|\geq k_i\} $ for $ i\in\{1, 2, \ldots, l\} $. The shares are generated in order without repetition. We define the intersection in the following manner.

    For the first scheme, $ (k_1, n_1) $-SS scheme, the participants in $ \mathbb{P}_1 $ are defined as

    $ P1={P11,,P1n1}.
    $
    (3.2)

    Then, we define the second participant set $ \mathbb{P}_2 $. If it has common participants with the first participant set, their intersection is defined as $ \text{U}_{2, 1} = \mathbb{P}_1\bigcap\mathbb{P}_2 = \big\{P_1^{2, 1}, \ldots, P_{u_{2, 1}}^{2, 1}\big\} $ with $ |\text{U}_{2, 1}| = u_{2, 1} $. Then, the second participants set is expressed as

    $ P2={P2,11,,P2,1u2,1,P2u2,1+1,,P2n2}.
    $
    (3.3)

    For the third participant set $ \mathbb{P}_3 $, if they have common participants with the first and the second participant sets, we denote them as $ \text{U}_{3, 1} = \mathbb{P}_3\bigcap\mathbb{P}_1 = \big\{P_1^{3, 1}, \ldots, P_{u_{3, 1}}^{3, 1}\big\} $ with $ |\text{U}_{3, 1}| = u_{3, 1} $, and $ \text{U}_{3, 2} = (\mathbb{P}_3\bigcap\mathbb{P}_2)\setminus\text{U}_{3, 1} = \big\{P_1^{3, 2}, \ldots, P_{u_{3, 2}}^{3, 2}\big\} $ with $ |\text{U}_{3, 2}| = u_{3, 2} $, meeting the requirement that $ \text{U}_{3, 1}\bigcap\text{U}_{3, 2} = \varnothing $. Then, the third participant set can be defined as

    $ P3={P3,11,,P3,1u3,1,P3,2u3,1+1,,P3,2u3,1+u3,2,P3u3,1+u3,2+1,,P3n3}.
    $
    (3.4)

    The $ i $-th participant set $ \mathbb{P}_i $ is assumed to have $ \text{U}_{i, 1} = \mathbb{P}_i\bigcap\mathbb{P}_1 = \big\{P_1^{i, 1}, \ldots, P_{u_{i, 1}}^{i, 1}\big\} $ with $ |\text{U}_{i, 1}| = u_{i, 1} $, $ \text{U}_{i, 2} = (\mathbb{P}_i\bigcap\mathbb{P}_2)\setminus\text{U}_{i, 1} = \big\{P_1^{i, 2}, \ldots, P_{u_{i, 2}}^{i, 2}\big\} $ with $ |\text{U}_{i, 2}| = u_{i, 2} $ and $ \text{U}_{i, j} = (\mathbb{P}_i\bigcap\mathbb{P}_j)\setminus\Big(\bigcup\limits_{s = 1}^{j-1}\text{U}_{i, s}\Big) = \big\{P_1^{i, j}, \ldots, P_{u_{i, j}}^{i, j}\big\} $ with $ |\text{U}_{i, j}| = u_{i, j} $ for $ j\in \{3, \ldots, i-1\} $, meeting the requirement that $ \text{U}_{i, j}\bigcap\text{U}_{i, k} = \varnothing $ for $ j\neq k $ and $ j, k\in \{3, \ldots, i-1\} $. Therefore,

    $ Pi={Pi,11,,Pi,1ui,1,Pi,2ui,1+1,,Pi,2ui,1+ui,2,,Pi,i1ui,1+ui,2++ui,i2+1,,Pi,i1ui,1+ui,2++ui,i1,Piui,1+ui,2++ui,i1+1,,Pin3}.
    $

    The remaining $ n-3 $ participant sets are defined in the same manner as participant set $ \mathbb{P}_i $. Let $ \text{U} = \bigcup\limits_{i = 1}^{l}\bigcup\limits_{j = 1}^{i-1}\text{U}_{i, j} $. To maintain the security of each secret, the number of multi-privilege participants for each $ (k_i, n_i) $ SS scheme in $ \mathbb{P}_i $ should be less than $ k_i $. Therefore,

    $ |(lj=1,jiPj)Pi|<ki
    $
    (3.5)

    holds, so the leakage of secret information through the collusion of the multi-privilege participants can be precluded.

    With the above notations, we now give a formal definition of the $ ((k_1, n_1);\ldots; (k_l, n_l)) $-CSS scheme with $ \text{U} $.

    Definition 3 A $ l $ tuples of the $ (k_i, n_i) $ SS scheme with participant set $ \mathbb{P}_i $ sharing a secret $ s_i $, $ i = 1, 2, \ldots, l $ with intersection $ \text{U} $ constitute a $ ((k_1, n_1);\ldots; (k_l, n_l)) $-CSS scheme with $ \text{U} $ depicted as above if the following two conditions hold:

    1. for all $ A\subseteq \mathbb{P}_i $ and $ |A|\geq k_i $, $ H(s_i|A) = 0 $ for $ i = 1, \ldots, l $;

    2. for all $ A\subseteq \bigcup\limits_{i = 1}^{l} \mathbb{P}_i $ and $ \Big|A\bigcap(\bigcup\limits_{j = 1}^{l} \mathbb{P}_i)\Big| < k_i $, $ 0 < H(s_i|S_A)\leq H(s_i) $ for $ i = 1, \ldots, l $.

    The first condition ensures that each secret can be revealed correctly by its authorized subsets. The second condition prevents the unauthorized subsets from collusively revealing the secret. When the "=" relation holds in the second condition, the $ ((k_1, n_1); \ldots; (k_l, n_l)) $-CSS scheme has a perfect security. It is called asymptotically perfect if for all $ \epsilon > 0 $, there exists $ x_0\geq 0 $ such that for all $ A\subseteq \bigcup\limits_{i = 1}^{l} \mathbb{P}_i $ with $ x\geq x_0 $, we have that $ \bigtriangleup H = |H(s_i)-H(s_i|S_A)|\leq \epsilon $ holds for all $ \Big|A\bigcap(\bigcup\limits_{j = 1}^{l} \mathbb{P}_i)\Big| < k_i $ where $ i = 1, \ldots, l $. We now present the construction scheme of a $ ((k_1, n_1); $ $ \ldots; (k_l, n_l)) $-CSS with $ \text{U} $.

    Scheme 2 The proposed $ ((k_1, n_1); \ldots; (k_l, n_l)) $-CSS with $ \text{U} $

    Distribution phase

    1. Dealer 1 chooses a large prime number $ p_{0, 1} $ and a sequences of pairwise coprime positive integers,

    $ p_{0,1} \lt p_{1,1} \lt p_{2,1} \lt \cdots \lt p_{n_1,1}, $

    satisfying $ \prod\limits_{i = 1}^{k_1}p_{i, 1} > p_{0, 1}\prod\limits_{i = 1}^{k_1-1}p_{n_1-i+1, 1} $, $ \gcd(p_{j, 1}, p_{k, 1}) = 1 $, $ j\neq k $ for $ j, k\in\{1, 2, \ldots, n_1\} $. Dealer 1 selects a secret $ s_1\in\mathbb{Z}_{p_{0, 1}} $ and a random integer $ \alpha_1 $, and computes the secret related value $ S_1 = s_1+\alpha_1 p_{0, 1} $ such that $ S_1\in(\phi_{k_1-1}^1, \phi_{k_1}^1] $. Here, we set $ \prod\limits_{j = 1}^{k_i}p_{j, i} = \phi_{k_i}^i $ and $ \prod\limits_{j = 1}^{k_i-1}p_{n_i-j+1, i} = \phi_{k_i-1}^i $ for $ 1\leq i\leq l $. Shares for the participants in $ \mathbb{P}_1 $ are generated as

    $ Sj,1s1+α1p0,1modpj,1,
    $

    where $ j\in\{1, 2, \ldots, n_1\} $. Dealer 1 picks the $ u_{i, 1} $ multi-privilege shares $ \big\{S_1^{i, 1}, \ldots, S_{u_{i, 1}}^{i, 1}\big\} $ and passes them to Dealer $ i $.

    2. Dealer 2 receives the $ u_{2, 1} $ multi-privilege shares $ \big\{S_1^{2, 1}, \ldots, S_{u_{2, 1}}^{2, 1}\big\} $ from $ \text{U}_{2, 1} $. Then, he/she chooses a large prime number $ p_{0, 2} $ and a sequence of pairwise coprime positive integers,

    $ p_{0,2} \lt p_{1,2} \lt p_{2,2} \lt \cdots \lt p_{{n_2},2}, $

    satisfying $ \prod\limits_{i = 1}^{k_2}p_{i, 2} > p_{0, 2}\prod\limits_{i = 1}^{k_2-1}p_{n_2-i+1} $ and $ S_{j}^{2, 1} < p_{j, 2} $ for $ 1\leq j\leq u_{2, 1} $, where $ \gcd(p_{j, 2}, p_{k, 2}) = 1 $, $ j\neq k $ for $ j, k\in\{1, 2, \ldots, n_2\} $.

    Dealer 2 selects a secret $ s_2\in\mathbb{Z}_{p_{0, 2}} $ and a random integer $ \alpha_2 $ and computes the secret related value $ S_2 = s_2+\alpha_2 p_{0, 2} $ satisfying the condition $ S_2\in\big(\phi_{k_2-1}^2, \phi_{k_2}^2\big] $ and the following congruent equations:

    $ {s2S2modp0,2,S1,2(=S2,11)S2modp1,2,,Su2,1,2(=S2,1u2,1)S2modpu2,1,2.
    $
    (3.6)

    Here, we assume that the multi-privilege participants in $ \text{U}_{2, 1} $ are the first $ u_{2, 1} $ participants in $ \mathbb{P}_2 $. The integer $ \alpha_2 $ can be determined according to Remark 1. The remaining $ n_2-u_{2, 1} $ shares $ S_{j, 2} $ can be determined by using

    $ Si,2=S2modpi,2.
    $

    Dealer 2 distributes shares $ S_{1, 2} $, $ S_{2, 2} $, $ \ldots $, $ S_{n_2, 2} $ to participants in $ \mathbb{P}_2 $ privately. Dealer 2 also sends multi-privilege shares $ \big\{S_1^{i, 2} $, $ S_2^{i, 2} $, $ \ldots $, $ S_{u_{i, 2}}^{i, 2}\big\} $ to Dealer $ i $ for $ i\in \{3, \ldots, l\} $.

    3. Dealer $ i $ receives shares $ \big\{S_1^{i, j} $, $ S_2^{i, j} $, $ \ldots $, $ S_{u_{i, j}}^{i, j}\big\} $ from dealer $ j $, $ j\in\{1, \ldots, i-1\} $, $ i\in\{3, 4, \ldots, l\} $. Then, he/she chooses a large prime number $ p_{0, i} $ and a sequence of pairwise coprime positive integers,

    $ p_{0,i} \lt p_{1,i} \lt p_{2,i} \lt \cdots \lt p_{{n_i},i}, $

    satisfying $ \prod\limits_{j = 1}^{k_i}p_{j, i} > p_{0, i}\prod\limits_{j = 1}^{k_i-1}p_{n_i-j+1} $ and with $ S_{k}^{i, j} < p_{k, i} $ for $ 1\leq k\leq u_{i, j} $, where $ \gcd(p_{j, i}, p_{k, i}) = 1 $, $ j\neq k $ for $ j, k\in\{1, 2, \ldots, n_i\} $. Dealer $ i $ selects a secret $ s_i\in\mathbb{Z}_{p_{0, i}} $ and a random integer $ \alpha_i $, and computes the secret related value $ S_i = s_i+\alpha_i p_{0, i} $ satisfying $ S_i\in\big(\phi_{k_i-1}^i, \phi_{k_i}^i\big] $ and the following congruent equations:

    ${si=Simodp0,i,Si,1(=Si,11)Simodp1,i,,Si,ui,1(=Si,1ui,1)Simodpui,1,i,}Ui,1,Si,ui,1+1(=Si,21)Simodpui,1+1,i,,Si,ui,1+ui,2(=Si,2ui,2)Simodpui,1+ui,2,i,}Ui,2,Sui,1+ui,2++ui,j1+1,i(=Sj,i1)Simodpui,1+ui,2++ui,j1+1,i,,Sui,1+ui,2++ui,j,i(=Si,jui,j)Simodpui,1+ui,2++ui,j,i,}Ui,j,  3ji1.
    $
    (3.7)

    Here, we assume that the common participants in $ \text{U}_{i, j} $ appear in $ \mathbb{P}_i $ in increasing order of $ i, j $. The integer $ \alpha_i $ can be determined according to Remark 2 below. Then, Dealer $ i $ computes the shares for the remaining participants in set $ \mathbb{P}_i $ by

    $ S_{j,i}\equiv S_i \bmod p_{j,i}, $

    for $ u_i+1\leq j\leq n_i $. Let $ u_i = u_{i, 1}+u_{i, 2}+\cdots+u_{i, i-1} $. Dealer $ i $ sends shares $ S_{j, i} $ to participants in $ \mathbb{P}_i $ and the multi-privilege shares $ \big\{S_1^{j, i} $, $ S_2^{j, i} $, $ \ldots $, $ S_{u_{j, i}}^{j, i}\big\} $ to Dealer $ j $ for $ j = i+1, \ldots, l $.

    Reconstruction phase

    Given any $ k_i $ shares of $ \mathbb{P}_i $, such as $ S_{j_1, i} $, $ \ldots $, $ S_{j_{k_i}, i} $, we can find the secret related value $ S_i $ according to the CRT by using (2.2) and compute the secret $ s_i\equiv S_i\bmod p_{0, i} $, $ i\in\{1, 2, \ldots, l\} $.

    Remark 2. Step 3 in Scheme 2 is the key point to construct the CSS scheme. It allows each multi-privilege participant to take one share to manage multiple secrets. The secret can be randomly chosen by each dealer. Here we show how to determine the secret related value $ S_i $. The unique integer $ w_i $ can be evaluated from (3.7) according to the CRT by using (2.2). Then, we can determine $ \alpha_i = y_i+x_ip_{1, i}\ldots p_{u, i} $ according to

    $ Si=wi+xip0,ip1,ipui,i(ki1j=1pnj+1,i,kij=1pj,i],wi=si+yip0,i(ui1j=0pnj+1,i,uij=0pj,i].
    $

    Because $ y_i $ and $ w_i $ are uniquely determined from (3.7), and $ x $ has multiple random candidates under the above condition, the variable $ \alpha_i $ has the same random choices as the variable $ x_i $.

    In this section, we analyse the performance of the proposed scheme in terms of security and correctness. The performance comparison with previous collaborative schemes is shown. The experiments demonstrate the construction process of CSS proposed scheme and verify the two characteristics.

    It is clear that the security of the proposed scheme is the same as that of the scheme in [18] because each single scheme in the CSS scheme satisfies the security condition (2.3). The shares of multi-privilege participants who are involved in multiple secrets have more tendency to be attacked. The regular participants have the same role and security as that they have in a single SS scheme. Therefore, we consider three possible attacks with respect to multi-privilege participants and illustrate them in the following.

    ● The multi-privilege participants cannot recover any secret independently because of (3.5).

    ● The multi-privilege participants' unity with the participants in $ \Gamma_i $ cannot recover the corresponding secret $ s_i $ if their number is less than its threshold $ k_i $.

    ● The multi-privilege participants' unity with the participants in $ \mathbb{P}_i $ cannot recover the secret $ s_j(j\neq i) $ if their number is less than the related threshold. Furthermore, even if their number is not less than the related threshold, no knowledge about $ s_j $ will be leaked, because $ |(\text{U}\bigcup \mathbb{P}_i)\bigcap\mathbb{P}_j)|\leq k_j-1 $.

    It is easy to verify that the three styles of attack will not succeed in obtaining any useful knowledge because they all satisfy condition (3.5). The multi-privilege participants are unlikely to obtain secret information. The proposed CSS scheme is secure against $ k-1 $ colluding participants.

    The key point of the construction of CSS scheme is that each secret is still chosen randomly by its dealer and is not affected by the generated multi-privilege shares. Conditions (3.1) and (3.7) can guarantee that the secret $ s $ can be chosen randomly and the secret related value $ S $ can be calculated to satisfy the security requirement of CSS. The reasons are illustrated in the Remark 1 and Remark 2. When the threshold of any single scheme is reached, the secret can be evaluated by solving congruent equations using the CRT. The correctness of the proposed scheme is clear. The correctness and security proofs are presented in Theorem 2.

    Theorem 2. The proposed CSS scheme based on the CRT is a asymptotically perfect $ ((k_1, n_1);\ldots; (k_l, n_l)) $-CSS scheme with $ \mathit{\text{U}} $.

    Proof. We need to prove its correctness and asymptotically perfect security.

    Before we prove the asymptotically perfect security, the proposed scheme needs to be validated. We show that for all $ A\subseteq \mathbb{P}_i $ and $ |A|\geq k_i $, where $ i\in \{1, 2, \ldots, l\} $, the secret can be recovered correctly from the shares in $ A $. Assuming that $ A = \{i_1, i_2, \cdots, i_{|A|}\} $, we collect their shares $ S_{i_1, i}, S_{i_2, i}, \cdots, S_{i_{|A|}, i} $ and have the following equations of congruence:

    $ {SiSi1,imodpi1,i,SiSi2,imodpi2,i,,SiSi|A|,imodpi|A|,i.
    $
    (4.1)

    The moduli of the above congruent equations satisfy $ \prod_{\substack{j\in A, \\ |A|\geq t_i}} p_{j, i}\geq \phi_{k_i}^i $. Because we know the secret related value $ S_i\in(\phi_{k_i-1}^i, \phi_{k_i}^i] $, it can be uniquely determined from the above equations of congruence by using the CRT. Then, we compute $ s_i = S_i \bmod \; p_0 $ to obtain the secret $ s_i $.

    We prove its the asymptotically perfect security in the following. We show the security for the proposed scheme. The first two types of attack satisfy the condition of (3.5) and belong to the unauthorized subset of $ S_i $. No useful information will be leaked. The third type attack fulfills the condition $ |(\text{U}\bigcup \mathbb{P}_i)\bigcap\mathbb{P}_j| < k_j $ and belongs to the unauthorized subset of $ S_j $. Now we prove that the entropy loss of the secret derived from the the unauthorized share subset of $ S_j $ is negligible for $ j\in \{1, 2, \ldots, l\} $.

    Firstly, we derive the candidates of the secret related value by the shares of the unauthorized subset of $ S_j $. Let $ A\subseteq \mathbb{P}_j $ be the unauthorized subset of $ S_j $. Its shares $ {S_{i_r, j}} $, $ i_r\in A $ with $ |A| < t_j $, for the threshold $ t_j $ are collected and constitute the following congruent equations:

    $ {SjSi1,jmodpi1,j,SjSi2,jmodpi2,j,,SjSi|A|,jmodpi|A|,j.
    $
    (4.2)

    There is a unique solution $ X\in\big(0, \prod\limits_{i\in A}p_{i, j}\big) $ for (4.2) according to Theorem 1. The candidates of the secret related value are $ S_j = X+y\cdot\prod\limits_{i\in A}p_{i, j} $ according to the CRT, where $ y\in\{1, \ldots, C(A)\} $ with $ C(A)\triangleq\Big\lfloor\prod\limits_{1\leq i\leq t_j} p_{i, j}/\prod\limits_{i\in A}p_{i, j}\Big\rfloor $. Since $ S_j\in\Big(\phi_{k_j-1}^j, \phi_{k_j}^j\Big] $ and $ p_{0, j}\phi_{k_j-1}^j < \phi_{k_j}^j $, we can derive that

    $ C(A)>p0,j1,
    $
    (4.3)

    from $ \prod\limits_{i\in A}p_{i, j} \leq \phi_{k_j-1}^j $.

    Secondly, we compute the conditional entropy of the secret by the known shares $ S_A $ from the unauthorized subset of $ S_j $. The secret candidates can be derived by $ s = S_j(\bmod p_{0, j}) $. The number of secret candidates is not reduced according to (4.3). Let $ C(A) = p_{0, j} N+r $ with $ 0\leq r < p_{0, j} $. The $ C(A) $ candidates of secret related value $ S_j $ are mapped to $ p_{0, j} $ secret candidates. The secret candidates which will appear $ N+1 $ times and $ N $ times are denoted by $ s^1 = \big\{s^j_1, s^j_2, \ldots, s^j_r\big\} $ and $ s^0 = \big\{s_{r+1}, s_{r+2}, \ldots, s_{p_{0, j}}\big\} $, respectively. The two sets satisfy both $ s^0\bigcap s^1 = \emptyset $ and $ s^0\bigcap s^1 = \mathbb{Z}_{p_{0, j}} $. Given shares $ S_A $, we compute the conditional entropy of the secret,

    $ H(s|SA)=ri=1pilogpip0,ji=r+1pilogpi=rN+1C(A)logN+1C(A)(p0,jr)NC(A)logNC(A).
    $

    $ H(s|S_A) $ can be lower bounded as

    $ H(s|SA)>rN+1C(A)logC(A)N+1+(p0,jr)NC(A)logC(A)N+1=logN+1C(A),
    $

    and upper bounded as

    $ H(s|SA)<rN+1C(A)logNC(A)(p0,jr)NC(A)logNC(A)=logC(A)N.
    $

    We obtain that $ \log \frac{C(A)}{N+1} < H(s|S_A) < \log \frac{C(A)}{N} $.

    Thirdly, we compute the loss of entropy of the secret $ \bigtriangleup H $. The entropy of the secret satisfies $ H(s) = \log p_{0, j} $ since $ s\in_R \mathbb{Z}_{p_{0, j}} $.

    $ H=|H(s)H(s|SA)|=|log(1±rC(A))|<logp0,jC(A).
    $
    (4.4)

    By hypothesis, the prime $ p_{i, j} $s are consecutive for $ 1\leq i\leq n_j $. It follows that $ p_{i+1, j} < p_i+p_i^{\frac{1}{2}+\frac{1}{21}} $ for $ p_i $ sufficiently large (See [32], p. 193). Because the primes $ p_{i, j} $'s are consecutive, it holds that, for all sufficiently large $ p_{0, j} $

    $ C(A)+1\geq p_{0,j}^t\Big/\Big(p_{0,j}^{t-1}+\sum\limits_i a_ip_0^{b_i}\Big), $

    where $ a_i\in \mathbb{R^+} $ and $ 0 < b_i < t-1 $, for all $ i $. For all sufficiently large prime $ p_{0, j} $, it holds

    $ \frac{p_{0,j}}{C(A)}\leq p_{0,j}\Big(p_{0,j}^{t-1}+\sum\limits_i a_ip_0^{b_i}\Big)\Big/\Big(p_{0,j}^t-p_{0,j}^{t-1}-\sum\limits_i a_ip_0^{b_i}\Big). $

    Applying the logarithm operator and using (4.4), we get

    $ \bigtriangleup H = |H(s)-H(s|S_A)|\leq \log p_{0,j}\Big(p_{0,j}^{t-1}+\sum\limits_i a_ip_0^{b_i}\Big)\Big/\Big(p_{0,j}^t-p_{0,j}^{t-1}-\sum\limits_i a_ip_0^{b_i}\Big). $

    The upper bound converges to 0 when $ p_{0, j} $ converges to infinity. Thus, the asymptotically perfect security is proved.

    The efficiency of the proposed scheme is compared with that of the previous CSS scheme in terms of share size, broadcast message size, security, recovery complexity and recovery quality in Table 1. From Table 1, we can see that scheme [16] requires high recovery complexity with the exact reconstructed secret. The scheme in [11] has zero computational complexity in the recovery phase, but it decreases the visual effect of the secret and expands the share size. The proposed CSS scheme can reconstruct the secret exactly with lower recovery complexity. Furthermore, it can process complex participant intersections. It provides broad applications for group collaborations.

    Table 1.  The performance comparison with other CSS schemes.
    Scheme Share size Security Computation complexity Recovery quality
    CSS([16]) $H(S)$ perfect $O(k\log^2k)$ exact
    CVS([11]) $mH(S)$ perfect $0(\text{visual})$ lower
    ours $H(S)$ perfect $O(k)$ exact
    Remark. $m(>1)$ is the pixel expansion which is determined by the detailed scheme.

     | Show Table
    DownLoad: CSV

    The proposed CSS scheme is different from the multi-secret sharing scheme [34,33]. But it can be used to construct such schemes when $ u = 0 $ or $ u_{i, j} = 0 $. Under such application, it has the same structure with the multi-secret sharing scheme which allows a single secret to be shared per threshold value [34,33]. But such multi-secret sharing schemes cannot be used to construct the proposed CSS scheme. The CSS scheme has special collaborative properties that general multi-secret sharing schemes don't have.

    To demonstrate the construction strategy of the collaborative schemes, two numerical examples are used to illustrate our proposed scheme. A $ ((3, 5);(4, 6)) $-CSS with its $ \text{U} $ is shown in Example 2 by combining step 1 and step 2. A $ ((3, 5);(4, 6);(5, 7)) $-CSS with its $ \text{U} $ is obtained by combining step 1, step 2 and step 3. The experimental results also demonstrate the correctness and security of the proposed CSS scheme.

    Example 2. Suppose there are three secrets $ (s_1 $, $ s_2 $ and $ s_3) $ that can be protected by three dealers with three traditional threshold schemes as a $ (3, 5) $ scheme, a $ (4, 6) $ scheme and a $ (5, 7) $ scheme, respectively. The participant intersections are shown in Figure 3. Five participants with the first secret form the group $ \mathbb{P}_1 = \{A_1, A_2, A_3, A_4, A_5\} $, and six participants with the second secret form the group $ \mathbb{P}_2 = \{B_1(A_1), B_2(A_2), B_3, B_4, B_5, B_6\} $, and seven participants with the third secret form the group $ \mathbb{P}_3 = \{C_1(A_2), C_2(B_3), C_3, C_4, C_5, C_6, C_7\} $. The share generation process is conducted in three steps as follows. The main parameters are shown in Table 2. The multi-privilege shares are labelled with the asterisks.

    Figure 3.  The participant intersections occur in a $ ((3, 5); (4, 6); (5, 7)) $-CSS scheme.
    Table 2.  The moduli and shares for a $((3, 5); (4, 6); (5, 7))$-CSS scheme with $\text{U}$.
    Scheme $i$ $p_{0, i}$ $s_i$ $(p_{i, 1}, S_{i, 1})$ $(p_{i, 2}, S_{i, 2})$ $(p_{i, 3}, S_{i, 2})$ $(p_{i, 4}, S_{i, 4})$ $(p_{i, 5}, S_{i, 5})$ $(p_{i, 6}, S_{i, 6})$ $(p_{i, 7}, S_{i, 7})$
    (3, 5) 1 113 112 (119, $80^{*}$) (211, $16^{**}$) (223, 51) (227, 66) (229,115) $--$ $--$
    (4, 6) 2 151 150 (263, $80^{*}$) (269, $16^{**}$) (271, $260^{***}$) (277,249) (281, 46) (283, 72) $--$
    (5, 7) 3 191 178 (397, $16^{**}$) (401, $260^{***}$) (409,155) (419,215) (421,120) (431,363) (433,313)
    Remark. $80^{*}$ denotes the multi-privilege share for for $A_1(B_1)$; $~16^{**}$ denotes the multi-privilege for $A_2(B_2, ~C_1)$; $~260^{***}$ denotes the multi-privilege for $B_3(C_2)$.

     | Show Table
    DownLoad: CSV

    Step 1: Share construction for a $ (3, 5) $ scheme.

    The secret $ s_1 = 112 $ and $ p_{0, 1} = 113 $, and the pairwise coprime numbers and shares are shown in Table 2. Because $ \mathbb{Z}\big(\Phi_{k_1-1}^1, \Phi_{k_1}^1\big] = \mathbb{Z}(51983, 9363547] $, we have $ \alpha_1\in[461, 82863] $ such that $ S_1 = s_1+\alpha_1p_{0, 1}\in\mathbb{Z}\big(\Phi_{k_1-1}^1, \Phi_{k_1}^1\big] $. We take $ \alpha_1 = 1000 $, $ S_1 = 113112 $. Shares for the participants in $ \mathbb{P}_1 $ can be computed by $ S_{j, 1}\equiv 113112 \bmod p_{j, 1}. $ The multi-privilege participant sets are $ \text{U}_{2, 1} = \{p_{1, 1}, p_{2, 1}\} $, $ \text{U}_{3, 1} = \{p_{2, 1}\} $. Share 80 for participant $ A_1(B_1) $ and share 16 for participant $ A_2(B_2, C_1) $ are picked and handed over to Dealer 2. Share 16 for participant $ A_2(C_1) $ is handed over to Dealer 3.

    Step 2: Share construction for the $ (4, 6) $ scheme.

    Dealer 2 chooses a secret $ s_2 = 150 $, $ p_{0, 2} = 151 $, and a sequences of pairwise coprime positive integers shown in Table 2. Dealer 2 already has two shares: 80 and 16 and the secret 150. By using (3.1) and Remark 2, the unique solution $ w_2 = 9317907\in(39713, 10682797] $ is obtained. We can take a random variable $ x_2 $ such that $ S_2 = w+x_2p_{0, 2}p_{1, 2}p_{2, 2}\in\mathbb{Z}\big(\Phi_{k_2-1}^2, \Phi_{k_2}^2\big] = \mathbb{Z}(22027871, 5310765049] $. Assuming $ x_2 = 300 $, then $ S_2 = 9317907+300\cdot 10682797 = 3214157007\in \mathbb{Z}\big(\Phi_{k_2-1}^2, \Phi_{k_2}^2\big] $. Thus, $ \alpha_2 = 21285807 $. The remaining shares can be generated as $ s_{j, 2} = S_2\bmod p_{j, 2} $ for $ 3\leq j\leq 6 $. The generated shares are shown in Table 2.

    Step 3: Share construction for the $ (5, 7) $ scheme.

    Dealer 3 already receives shares $ S_1^{3, 1} = 16 $ for $ C_1 $ and $ S_1^{3, 2} = 260 $ for $ C_2 $. He or she chooses randomly $ s_3 = 178 $, $ p_{0, 3} = 191 $ and the sequences of pairwise coprime positive integers to constructs a (5, 7) threshold scheme shown in Table 2. The shares (191,178), (397, 16), and (401,260) are used to generate the secret related value $ S_3 $. By using formula (3.7) and Remark 2, the unique solution $ w_3 = 7298861\in(75827, 30406627] $ is obtained. Since $ S_3 = w_3+x_3\prod\limits_{j = 0}^2p_{j, 3}\in \mathbb{Z}\big(\Phi_{k_3-1}^3, \Phi_{k_3}^3\big] = \mathbb{Z}(32920110577, 11485616365627] $, it is derived that $ x_3\in\mathbb{Z}(1082, 377733] $. We choose $ x_3 = 99999 $ and obtain $ S_3 = 7298861+99999\cdot 30406627 = 3040639592234\in \mathbb{Z}(\Phi_{k_3-1}^3, \Phi_{k_3}^3] $. The remaining shares can be generated using $ S_{j, 3} = S_3\bmod p_{j, 3} $ for $ 3\leq j\leq 7 $.

    The ((3, 5); (4, 6))-CSS scheme with its $ \text{U} $ can be verified correct. When any three participants of the first (3, 5) scheme present their shares, for example, (211, 16), (223, 51), and (227, 66), then the first secret is obtained as

    $ S116×50621×111+51×47897×144+66×47053×188mod211223227=113112,s1113112mod113=112.
    $

    The correctness and security for the ((3, 5);(4, 6);(5, 7))-CSS with its $ \text{U} $ can be verified in the same manner. It is clear that the collaborative scheme can reveal each secret correctly when the participant sets are in the corresponding qualified subsets family. The participant set which includes all multi-privilege participants belongs to the unqualified subsets family of any secret and cannot obtain any information about that secret. The multi-privilege shares uniting the participants in $ \mathbb{P}_i $ cannot obtain any secret information about $ s_j $ when $ i\neq j $. The conclusions can be verified by using the data in Example 2. The CSS scheme has the same asymptotically perfect security as that of the Asmuth-Bloom scheme.

    In this paper, we proposed a collaborative SS scheme which provides a secure and efficient strategy to ease the share management in group collaborative environment. Each participant just needs to keep only one share to participate in multiple key management systems. It can solve the contradiction between privacy protection and collaborative sharing of confidential data. It can be used for secure data management across systems or joint computing platforms. Its efficiency and convenience in operation are attractive in distributed networks. The comparative study of the proposed scheme with the state of the art approaches validates its efficiency.

    The collaborative scheme raises a number of related open problems, such as security concerns involving dishonest multi-privilege participants, dishonest dealers in different schemes, and the situation where other dealers become participants of a scheme. Various combinations of risks exist in this "open" environment. For example, some dishonest multi-privilege participants could work with other illegal participants or dealers to steal secrets. Tracing traitors could become more difficult than in the traditional single scheme situation.

    This work was supported the National Natural Science Foundation Nos. U1636219, 61872289, and 41807150, in part by Plan for Scientific Innovation Talent of Henan Province No. 2018JR0018 and the Science Foundation of Guangxi Nos. AA17204096 and AD16380076, in part by China Mobile Research Fund Project No. MCM20170407, and Key Laboratory of Digital Content Anti-Counterfeiting and Security Forensics of the state Administration of Press, Publication, Radio, Film and Television of the People's Republic of China.

    All authors declare no conflicts of interest in this paper.



    Conflict of interest



    The authors declare no conflict of interest.

    [1] Dimitri P, Corradini N, Rossi F, et al. (2005) The paradox of functional heterochromatin. Bioessays 27: 29–41. doi: 10.1002/bies.20158
    [2] Muhonen P, Holthofer H (2008) Epigenetic and microRNA-mediated regulation in diabetes. Nephrol Dial Transplant 24: 1088–1096. doi: 10.1093/ndt/gfn728
    [3] Non AL, Thayer ZM (2019) Epigenetics and human variation, In: A companion to anthropological genetics, 21: 293–308.
    [4] Weksberg R, Butcher DT, Cytrynbaum C, et al. (2019) Epigenetics, In: Emery and Rimoin's Principles and Practice of Medical Genetics and Genomics (Seventh Edition), 79–123.
    [5] American Diabetes Association (2010) Diagnosis and classification of diabetes mellitus, In: Diabetes Care, 33: S62–S69.
    [6] Bullard KM, Cowie CC, Lessem SE, et al. (2018) Prevalence of diagnosed diabetes in adults by diabetes type-United States, 2016. Morbidity Mortality Wkly Rep 30: 359.
    [7] National Institutes of Health (2014) National Institute of Diabetes and Digestive and Kidney Diseases, Bethesda, MD, 188–210.
    [8] MacFarlane AJ, Strom A, Scott FW (2009) Epigenetics: Deciphering how environmental factors may modify autoimmune type 1 diabetes. Mamm Genome 1: 9–10.
    [9] Garvey WT (2019) Clinical Definition of Overweight and Obesity, In: Bariatric Endocrinology, 121–143.
    [10] Jensen MD, Ryan DH, Hu FB, et al. (2014) 2013 AHA/ACC/TOS guideline for the management of overweight and obesity in adults. J Am Coll Cardiol 63: S102–S138.
    [11] Ling C, Rönn T (2019) Epigenetics in human obesity and type 2 diabetes. Cell Metab 29: 1028–1044. doi: 10.1016/j.cmet.2019.03.009
    [12] Roger VL, Go AS, Lloyd-Jones DM, et al. (2011) Heart disease and stroke statistics-2011 update: A report from the American Heart Association. Circulation 123: e18–209.
    [13] Andreassi MG, Barale R, Iozzo P, et al. (2011) The association of micronucleus frequency with obesity, diabetes and cardiovascular disease. Mutagenesis 26: 77–83. doi: 10.1093/mutage/geq077
    [14] Al-Hasani K, Mathiyalagan P, El-Osta A (2019) Epigenetics, cardiovascular disease, and cellular reprogramming. J Mol Cell Cardiol 128: 129–133. doi: 10.1016/j.yjmcc.2019.01.019
    [15] Smith CJ, Ryckman KK (2015) Epigenetic and developmental influences on the risk of obesity, diabetes, and metabolic syndrome. Diabetes Metab Syndr Obes 8: 295–302.
    [16] Xu L, Natarajan R, Chen Z (2019) Epigenetic risk profile of diabetic kidney disease in high-risk populations. Curr Diabetes Rep 19: 9. doi: 10.1007/s11892-019-1129-2
    [17] Keating ST, El‐Osta A (2013) Epigenetic changes in diabetes. Clin Genet 84: 1–10. doi: 10.1111/cge.12121
    [18] Jaenisch R, Bird A (2003) Epigenetic regulation of gene expression: How the genome integrates intrinsic and environmental signals. Nat Genet 3: 245–254.
    [19] Pollin TI (2011) Epigenetics and diabetes risk: Not just for imprinting anymore? Diabetes 60: 1859–1860. doi: 10.2337/db11-0515
    [20] Stankov K, Benc D, Draskovic D (2013) Genetic and epigenetic factors in etiology of diabetes mellitus type 1. Pediatrics 132: 1112–1122. doi: 10.1542/peds.2013-1652
    [21] Bramswig NC, Kaestner KH (2012) Epigenetics and diabetes treatment: An unrealized promise? Trends Endocrinol Metabol 23: 286–291. doi: 10.1016/j.tem.2012.02.002
    [22] Park JH, Stoffers DA, Nicholls RD, et al. (2008) Development of type 2 diabetes following intrauterine growth retardation in rats is associated with progressive epigenetic silencing of Pdx1. J Clin Invest 118: 2316–2324.
    [23] Kulkarni RN, Jhala US, Winnay JN, et al. (2004) PDX-1 haploinsufficiency limits the compensatory islet hyperplasia that occurs in response to insulin resistance. J Clin Invest 114: 828–836. doi: 10.1172/JCI21845
    [24] Pinney SE, Simmons RA (2010) Epigenetic mechanisms in the development of type 2 diabetes. Trends Endocrinol Metabol 21: 223–229. doi: 10.1016/j.tem.2009.10.002
    [25] Martínez JA, Milagro FI, Claycombe KJ, et al. (2014) Epigenetics in adipose tissue, obesity, weight loss, and diabetes. Adv Nutr 5: 71–81. doi: 10.3945/an.113.004705
    [26] Sommese L, Benincasa G, Schiano C, et al. (2019) Genetic and epigenetic-sensitive regulatory network in immune response: A putative link between HLA-G and diabetes. Expert Review Endocrinol Metabol 14: 233–241. doi: 10.1080/17446651.2019.1620103
    [27] Joyce B, Liu H, Wang L, et al. (2019) Abstract P073: A novel epigenetic link between gestational diabetes mellitus and macrosomia. Circulation 139: AP073.
    [28] Villeneuve LM, Reddy MA, Lanting LL, et al. (2008) Epigenetic histone H3 lysine 9 methylation in metabolic memory and inflammatory phenotype of vascular smooth muscle cells in diabetes. Proc Nat Acad Sci 105: 9047–9052. doi: 10.1073/pnas.0803623105
    [29] Miao F, Chen Z, Genuth S, et al. (2014) Evaluating the role of epigenetic histone modifications in the metabolic memory of type 1 diabetes. Diabetes 63: 1748–1762. doi: 10.2337/db13-1251
    [30] Barros L, Eichwald T, Solano AF, et al. (2019) Epigenetic modifications induced by exercise: Drug-free intervention to improve cognitive deficits associated with obesity. Physiol Behav 204: 309–323. doi: 10.1016/j.physbeh.2019.03.009
    [31] Ramos-Lopez O, Riezu-Boj JI, Milagro FI, et al. (2019) Associations between olfactory pathway gene methylation marks, obesity features and dietary intakes. Genes Nutr 14: 11. doi: 10.1186/s12263-019-0635-9
    [32] Xu L, Yeung MH, Yau MY, et al. (2019) Role of histone acetylation and methylation in obesity. Current Pharmacol Rep 5: 196–203. doi: 10.1007/s40495-019-00176-7
    [33] Romieu I, Dossus L, Barquera S, et al. (2017) Energy balance and obesity: What are the main drivers? Cancer Causes Control 28: 247–258. doi: 10.1007/s10552-017-0869-z
    [34] Austin GL, Ogden LG, Hill JO (2011) Trends in carbohydrate, fat, and protein intakes and association with energy intake in normal-weight, overweight, and obese individuals: 1971–2006. Am J Clin Nutr 93: 836–843. doi: 10.3945/ajcn.110.000141
    [35] Ou XH, Zhu CC, Sun SC (2019) Effects of obesity and diabetes on the epigenetic modification of mammalian gametes. J Cellul Physiol 234: 7847–7855. doi: 10.1002/jcp.27847
    [36] Ayers D, Boughanem H, Macías-González M (2019) Epigenetic influences in the obesity/colorectal cancer axis: A novel theragnostic avenue. J Oncology: 7406078.
    [37] Duale N, Witczak O, Brunborg G, et al. (2019) Sperm Epigenome in Obesity. Handb Nutr Diet Epigenet: 727–744.
    [38] Castro R, Rivera I, Struys EA, et al. (2003) Increased homocysteine and S-adenosylhomocysteine concentrations and DNA hypomethylation in vascular disease. Clin Chem 49: 1292–1296. doi: 10.1373/49.8.1292
    [39] Stenvinkel P, Karimi M, Johansson S, et al. (2007) Impact of inflammation on epigenetic DNA methylation-a novel risk factor for cardiovascular disease? J Int Med 261: 488–499. doi: 10.1111/j.1365-2796.2007.01777.x
    [40] Buro-Auriemma LJ, Salit J, Hackett NR, et al. (2013) Cigarette smoking induces small airway epithelial epigenetic changes with corresponding modulation of gene expression. Hum Mol Genet 22: 4726–4738. doi: 10.1093/hmg/ddt326
    [41] Ordovás JM, Smith CE (2010) Epigenetics and cardiovascular disease. Nat Rev Cardiol 7: 510. doi: 10.1038/nrcardio.2010.104
    [42] Webster AL, Yan MS, Marsden PA, et al. (2013) Epigenetics and cardiovascular disease. Can J Cardiol 29: 46–57. doi: 10.1016/j.cjca.2012.10.023
    [43] Shirodkar AV, Marsden PA (2011) Epigenetics in cardiovascular disease. Current Opin Cardiol 26: 209. doi: 10.1097/HCO.0b013e328345986e
    [44] Sun C, Burgner DP, Ponsonby AL, et al. (2013) Effects of early-life environment and epigenetics on cardiovascular disease risk in children: Highlighting the role of twin studies. Pediatr Res 73: 523. doi: 10.1038/pr.2013.6
    [45] Huang RC, Lillycrop KA, Beilin LJ, et al. (2019) Epigenetic age acceleration in adolescence associates with BMI, inflammation and risk score for middle age cardiovascular disease. J Clin Endocrinol Metabol 104: 3012–3024. doi: 10.1210/jc.2018-02076
    [46] Elia L, Condorelli G (2019) The involvement of epigenetics in vascular disease development. Inter J Biochem Cell Biol 107: 27–31. doi: 10.1016/j.biocel.2018.12.005
    [47] Campos EI, Reinberg D (2009) Histones: Annotating chromatin. Annu Rev Gene 43: 559–599. doi: 10.1146/annurev.genet.032608.103928
    [48] Fedorova E, Zink D (2008) Nuclear architecture and gene regulation. BBA -Molecul Cell Res 1783: 2174–2184.
    [49] Kouzarides T (2007) Chromatin modifications and their function. Cell 128: 693–705. doi: 10.1016/j.cell.2007.02.005
    [50] Duan L, Liu C, Hu J, et al. (2018) Epigenetic mechanisms in coronary artery disease: The current state and prospects. Trends Cardiovasc Med 28: 311–319. doi: 10.1016/j.tcm.2017.12.012
  • This article has been cited by:

    1. Zhen Wu, Yining Liu, Xingxing Jia, A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management, 2020, 8, 2227-7390, 448, 10.3390/math8030448
    2. Xiaogang Wang, Zhongfan Yang, Zhiqiang Feng, Jun Zhao, A WSN Layer-Cluster Key Management Scheme Based on Quadratic Polynomial and Lagrange Interpolation Polynomial, 2020, 20, 1424-8220, 4388, 10.3390/s20164388
    3. Yi Jiang, Yong Shen, Qingyi Zhu, A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes, 2020, 20, 1424-8220, 1357, 10.3390/s20051357
    4. Xingxing Jia, Yusheng Guo, Xiangyang Luo, Daoshun Wang, Chaoyang Zhang, A perfect secret sharing scheme for general access structures, 2022, 595, 00200255, 54, 10.1016/j.ins.2022.02.016
    5. Liu Jinwang, Wu Tao, Li Dongmei, Chinese remainder theorem of modules over multivariate polynomial rings, 2022, 52, 1674-7216, 989, 10.1360/SSM-2021-0017
    6. Nikolay N. Shenets, On modular (CRT-based) secret sharing, 2024, 20, 2263-8733, 765, 10.1007/s11416-024-00530-4
    7. Yinong Song, Zichen Li, 2024, Multi-secret Threshold Sharing Scheme Based on Chinese Remainder Theorem, 979-8-3503-5169-9, 131, 10.1109/ICICSE61805.2024.10625673
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(5642) PDF downloads(1006) Cited by(18)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog