Review Topical Sections

Outbreaks of listeriosis associated with deli meats and cheese: an overview

  • Received: 12 May 2016 Accepted: 04 July 2016 Published: 08 July 2016
  • Microbial pollution of foods by undesirable microorganisms is a global food safety issue. One of such undesirable microorganism is the psychrotrophic, pathogenic specie of Listeria—Listeria monocytogenes that survives at low temperature. The source of contamination of this microbe into foods can be many including the food processing facilities due to improper sanitation procedures. The review of the literature on this important topic shows there are increasing concerns as regards contamination from Listeria in foods leading to many cases of listeriosis disease and food recalls. Ready-to-eat products, such as delicatessen (deli) meats and soft cheeses have repeatedly been identified by foodborne disease control programs as sources of outbreaks and products that put humans at risk for listeriosis. Although, most listeriosis cases tend to be sporadic in occurrence, outbreaks do occur frequently. Due to the global phenomenon of outbreaks associated with Listeria in deli meats and cheese, it requires an urgent attention from national and international authorities through rigorous procedures for its identification, surveillance procedures that can bring more awareness to the general public. There is also a need for more reports on the cases of Listeria particularly in developing countries, the standardization of identification procedures, and an improvement on national control programs by adequate surveillance.

    Citation: Dele Raheem. Outbreaks of listeriosis associated with deli meats and cheese: an overview[J]. AIMS Microbiology, 2016, 2(3): 230-250. doi: 10.3934/microbiol.2016.3.230

    Related Papers:

    [1] Yanrong Lu, Dawei Zhao . An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography. Mathematical Biosciences and Engineering, 2022, 19(1): 66-85. doi: 10.3934/mbe.2022003
    [2] Han-Yu Lin, Tung-Tso Tsai, Hong-Ru Wu, Miao-Si Ku . Secure access control using updateable attribute keys. Mathematical Biosciences and Engineering, 2022, 19(11): 11367-11379. doi: 10.3934/mbe.2022529
    [3] Lihong Guo, Jian Wang, Haitao Wu, Najla Al-Nabhan . XML security protection scheme based on Kerberos authentication and polynomials authorization. Mathematical Biosciences and Engineering, 2020, 17(5): 4609-4630. doi: 10.3934/mbe.2020254
    [4] Tao Liu, Shubhangi Vairagar, Sushadevi Adagale, T. Karthick, Catherine Esther Karunya, John Blesswin A, Selva Mary G . Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography. Mathematical Biosciences and Engineering, 2024, 21(3): 4762-4778. doi: 10.3934/mbe.2024209
    [5] Yifeng Yin, Zhaobo Wang, Wanyi Zhou, Yong Gan, Yanhua Zhang . Group key agreement protocol for edge computing in industrial internet. Mathematical Biosciences and Engineering, 2022, 19(12): 12730-12743. doi: 10.3934/mbe.2022594
    [6] Qi Wang, John Blesswin A, T Manoranjitham, P Akilandeswari, Selva Mary G, Shubhangi Suryawanshi, Catherine Esther Karunya A . Securing image-based document transmission in logistics and supply chain management through cheating-resistant visual cryptographic protocols. Mathematical Biosciences and Engineering, 2023, 20(11): 19983-20001. doi: 10.3934/mbe.2023885
    [7] Mikail Mohammed Salim, Jungho Kang, Yi Pan, Jong Hyuk Park . A Lightweight authentication scheme for IoT against Rogue Base Station Attacks. Mathematical Biosciences and Engineering, 2022, 19(11): 11735-11755. doi: 10.3934/mbe.2022546
    [8] Shufen Niu, Wei Liu, Sen Yan, Qi Liu . Message sharing scheme based on edge computing in IoV. Mathematical Biosciences and Engineering, 2023, 20(12): 20809-20827. doi: 10.3934/mbe.2023921
    [9] Zhiguo Qu, Leiming Jiang, Le Sun, Mingming Wang, Xiaojun Wang . Continuous variable quantum steganography protocol based on quantum identity. Mathematical Biosciences and Engineering, 2019, 16(5): 4182-4195. doi: 10.3934/mbe.2019208
    [10] Jianfei Cai, Guozheng Yang, Jingju Liu, Yi Xie . FastCAT: A framework for fast routing table calculation incorporating multiple protocols. Mathematical Biosciences and Engineering, 2023, 20(9): 16528-16550. doi: 10.3934/mbe.2023737
  • Microbial pollution of foods by undesirable microorganisms is a global food safety issue. One of such undesirable microorganism is the psychrotrophic, pathogenic specie of Listeria—Listeria monocytogenes that survives at low temperature. The source of contamination of this microbe into foods can be many including the food processing facilities due to improper sanitation procedures. The review of the literature on this important topic shows there are increasing concerns as regards contamination from Listeria in foods leading to many cases of listeriosis disease and food recalls. Ready-to-eat products, such as delicatessen (deli) meats and soft cheeses have repeatedly been identified by foodborne disease control programs as sources of outbreaks and products that put humans at risk for listeriosis. Although, most listeriosis cases tend to be sporadic in occurrence, outbreaks do occur frequently. Due to the global phenomenon of outbreaks associated with Listeria in deli meats and cheese, it requires an urgent attention from national and international authorities through rigorous procedures for its identification, surveillance procedures that can bring more awareness to the general public. There is also a need for more reports on the cases of Listeria particularly in developing countries, the standardization of identification procedures, and an improvement on national control programs by adequate surveillance.


    Password authenticated key exchange (PAKE) is an important cryptographic primitive that allows a client to authenticate herself and to establish a high-entropy session key with a remote server via only a common, low-entropy password. It is very convenient since that no complicated public key infrastructure (PKI) or dedicated hardware such as a token is needed in advance. Because of its convenience and significance, password authentication schemes are regarded as, and are likely to continue to be, the dominant authentication mechanism in the foreseeable future [1].

    In 1992, the most famous pioneering work of PAKE, called the Encrypted Key Exchange (EKE) protocol, was proposed by Bellovin and Merritt [2], in which the Diffie-Hellman flows are symmetrically encrypted under the common password to offer resistance to dictionary attack. Since then, a multitude of studies have been published on the construction of more efficient and more secure PAKE protocols in random oracle model [3,4], in the standard model [5,6,7,8,9], in multi-user setting [10,11], as well as on the security models suitable for the analysis of PAKE protocols [12,13]. Organizations like the International Organization for Standardization (ISO) have further issued a lot of password-related standards, such as ISO/IEC 11770-4, IEEE Std 1363.2, RFC 6124, etc., which further popularizes the widespread application of the PAKE protocols.

    Along with the growing concern about privacy protection, many people want to strengthen the widely used PAKE protocols with the additional property of anonymity, which keeps a client's identity secret not only to all outsiders but also to the server. To address this need, anonymous password- authenticated key exchange (APAKE) protocols were first presented by Viet et al. in 2005 [14] and then improved by Yang et al. [15], Shin et al. [16] and Hu et al. [17] in the password-only setting. While the client has access to some extra storage other than the password, the computational performance of APAKE protocols, especially on the server side, could be further improved. The storage extra approach was first proposed by Yang et al. [18] in ACSAC'09, and further developed by Shin et al. [19], Zhang et al. [20]. Furthermore, ISO/IEC has recently issued an APAKE standard denoted as ISO/IEC 20009-4 [21].

    Almost all the existing APAKE protocols, and most of the PAKE protocols, are designed in the symmetric setting, where the server holds all the clients' password in clear. This would be dramatic in case of server compromise. At the same time, the number of password leakage incidents and the cost to those experiencing them continue to increase in the last few years. Typical password data breaches include 167 million from LinkedIn [22], 3 billion from Yahoo [23] and 50 million from Facebook [24]. In order to mitigate the damage of server compromise, it is desirable to adapt traditional APAKE protocols to the verifier-based setting, in which the server holds a verifier corresponding to each client instead of the plain password. Although server verifier-based solutions have been put forward with respect to traditional (non-anonymous) PAKE protocols [25,26], only few verifier-based APAKE protocols [27,28] were proposed and, moreover, they are vulnerable to impersonation attacks (see details in Section 4).

    In this paper, we propose a verifier-based anonymous password-authenticated key exchange protocol, which provides additional security guarantees in case of server compromise. The new protocol, which is built on standard cryptographic primitives such as ElGamal public key encryption, password hashing scheme and smooth projective hash functions, is proven secure in the standard model rather than the random oracle model. Comparisons show that our protocol guarantees stronger security while pays very little in terms of computational efficiency.

    In this section, we recall the security model for APAKE protocols [17], which is extended from the security models for PAKE protocols [12] and for APAKE protocols [14,15,16].

    The participants of an APAKE protocol P consist of a set of clients C and a set of servers S. Without loss of generality, we assume that the set S contains only one server S={S}. The client set C consists of a set of honest clients Γ={Cj}1jn and a set of malicious clients E. Each client CC holds a password πC chosen according to some given distribution D as its authentication credential; the server holds a list of transformed password pwS={H(πC)}CC corresponding to all the clients. The notion H(πC) denotes the value by using a password transformation function on πC. It might be, for example, H(πC)=πC for the symmetric setting and H(πC)=sπC for the asymmetric setting.

    The adversary A, who has full control of the communication network and is modeled as a probabilistic polynomial time (PPT) Turing machine, can interact with various concurrent sessions of each user UCS through the following oracle queries:

    Execute(Cρ,Sδ): This query models those attacks that could be mounted by a passive adversary eavesdropping on communication between two honest sessions, where Cρ denotes the ρ-th session of client C and Sδ denotes the δ-th session of server S. The output of the query contains all the messages outputted by Cρ and Sδ during an honest execution.

    Send(Uρ,M): This query is used to model active attacks against a session Uρ of a user UCS. The adversary sends an arbitrary message M to the session Uρ, and gets the outputting message that would be generated by the Uρ upon receiving the message M.

    Reveal(Uρ): This query models the leakage or misuse of the session keys that have been used in those sessions other than the session being tested. In other words, this query is used to model known session key attacks.

    Corrupt(U): The query models the leakage of passwords of some clients or the server. If this query is asked to a client CC, the password πC of this client is returned. If this query is asked to the server S, the list of transformed passwords pwS={H(πC)}CC is returned.

    The AKE security would guarantee that, when a session key is generated freshly by honest participants and has not been leaked or misused, it would look like uniformly random to an adversary. For this purpose, the notions of partnering sessions and fresh sessions need to be defined first.

    Partnering sessions. A client session Cρ and a server session Sδ are called partnering sessions, if (1) they are the intended partner of each other; (2) they both accept; (3) their communication transcripts are matched with each other.

    Freshness. We say that a session Uρ satisfies the definition of freshness, if no Reveal query has been asked to this session or its partnering session, and no Corrupt query has been asked to the participants involved in this session.

    In addition, we need a new query to model the attack that the adversary distinguishes a real session key from a random one.

    Test(Uρ): This query can only be asked to a fresh session. When this query is received, a random bit b{0,1} is chosen and the query is answered as follows. If b=1, the real session key of Uρ is returned; if b=0, a random session key is returned.

    The adversary is allowed to ask as many as queries defined in Section 2.2 and the above Test query, with the restriction that the Test query can only be asked once and the target session of the Test query should be kept fresh. At the end, the adversary outputs a bit b as his guess to the hidden random bit b. The advantage of the adversary A is defined by Adv(A)=2Pr{b=b}1. An APAKE protocol P is AKE secure if for every PPT adversary A the advantage satisfies AdvAKEP(A)Cqssend+negl(k), where C and s are the Zipf parameters [1,29,30] corresponding to the password dictionary D, and qsend denotes the number of Send queries asked by the adversary.

    The client anonymity notion states that even the trusted server, which behaves in an honest-but-curious way, should not be capable of getting the actual identity of the client in communication. What the server can only learn about the client is that she is a legitimate member of the group Γ={Cj}1jn.

    Here we consider the server as a passive adversary M, who knows all the transformed passwords pwS={H(πC)}CC, interacting with the client in an honest way and wants to figure out the identity of the client. Denote by Πi the distribution of transcripts of the protocol P executed between the client Ci∈Γ and the server S. If for any two clients Ci, Cj∈Γ, the two distributions Πi,Πj are computational indistinguishable, i.e., |Pr{M(Πi)=1}Pr{M(Πj)=1}|negl(k), we say that the protocol P satisfies client anonymity.

    In the construction of our verifier-based APAKE protocol, we use both CPA secure (i.e., secure under chosen-plaintext attacks) and labeled PCA secure (standing for secure under plaintext-checking attacks) public key encryption schemes. Formally speaking, a public key encryption scheme is defined by three algorithms E=(KGen,Enc,Dec), where KGen on input 1k outputs a public/secret key pair (pk,sk), Enc on inputs pk, message m and the random string r outputs a ciphertext c, and Dec on inputs sk and c outputs m or . A label public key encryption scheme is a public key encryption that additionally admits a label to its encryption and decryption algorithms as cEnc(pk,m;label;r) and m or Dec(sk,c;label).

    We say that a public key encryption scheme is CPA secure, if when the public key pk is already published, every probabilistic polynomial time (PPT) adversary would have only negligible advantage in distinguishing the challenge ciphertexts corresponding to two messages m0,m1 chosen by the adversary. In order to address active attacks, a stronger notion called CCA security (standing for security under chosen-ciphertext attacks) was proposed, in which the adversary has additional access to a decryption oracle, which could decrypt any ciphertext other than the challenge ciphertext. Between CPA and CCA security, a new security notion termed PCA security, short for security under plaintext-checkable attacks, was recently proposed by Abdalla et al. [31]. The adversary in this notion does not have access to any decryption oracle, but has only access to an oracle indicating whether a given ciphertext/message pair is consistent, in the sense that the given ciphertext encrypts the given message.

    In order to formalize the way how verifiers are generated, Benhamouda et al. [25] presented a new cryptographic primitive called password hashing scheme. As an added benefit, the password hashing scheme could easily suit to smooth projective hash functions in an algebraic way. Concretely, a password hashing scheme consists of a tuple of algorithms PHS=(PSetup,PPreHash,PSalt,Phash). Let n denote the bit-length of possible passwords, i.e., πD⊂{0, 1}n. The algorithm PSetup on inputs the security parameter 1k and the bit-length of the password 1n outputs the parameter param. The algorithm PPreHash on inputs param and a password π outputs a pre-hash value P. The algorithm PSalt on input param outputs a salt s. The algorithm Phash takes as inputs the parameter param, a salt s and a password π, and outputs a hash value H.

    For the security of verifier-based APAKE protocols, a password hashing scheme should satisfy several security notions, such as the correctness, salt indistinguishability, second pre-image resistance, entropy preservation, pre-hash entropy preservation, and tight one-wayness [25]. The tight one-wayness is the most vital notion, as it ensures that recovering a valid password from a leaked server's file requires a time approximately equals computing 2β times of Phash, where β denotes the min-entropy of the password distribution.

    Smooth projective hash functions (SPHF) were introduced by Cramer and Shoup [32] in order to construct CCA secure public key encryption schemes. In 2003, Gennaro et al. [33] tailored the initial definition to the construction of PAKE protocols. Later, the SPHF definition was further developed by Katz et al. [34], Benhamouda et al. [6] and Abdalla et al. [35] to fit more complex language obtained by disjunctions or conjunctions of simpler languages.

    More specifically, given a language LX for some set X, a SPHF system for the language L consists of the following 4 algorithms H=(HashKG,ProjKG,Hash,ProjH). The hash key generation algorithm HashKG takes as input the language L and outputs a hash key hk. The algorithm ProjKG takes as inputs the language L, a hash key hk and possibly a word cL and outputs a projection key hp. The algorithm Hash takes as inputs the language L, a hash key hk and an element cX, and outputs the hash value corresponding to the word c. The algorithm ProjH takes as inputs the language L, a projection key hp, a word cL as well as the witness w with respect to the fact cL, and outputs the hash value corresponding to the word c.

    The security requirement of a SPHF system contains correctness and smoothness. The correctness property ensures that for any word cL and its related witness w, the following equation Hash(L,hk,c)=ProjH(L,hp,c,w) always holds. The smoothness property guarantees that, for any element cXL, even the corresponding projection key hp is published, the statistical distance between the distribution of Hash(L,hk,c) and uniform random is negligible.

    A one-time signature [36] is a weak notion of cryptographic signature that could be instantiated in the standard model, yet enjoys much more efficient computational complexity. Similar to classical signatures, a one-time signature consists of 3 algorithms Σ=(SignKG,Sign,Verify). The algorithm SignKG takes as input the security parameter 1k and outputs a pair of signing/verification keys (SK,VK). The algorithm Sign takes as inputs SK and the message m and outputs a signature σ. The algorithm Verify takes as inputs VK, a message m and a signature σ, and outputs 1 iff the σ is a valid signature of m. With respect to the security definition of existential unforgeability, we allow the adversary to get access to only one message/signature pair. If for any PPT adversary, the possible advantage is negligible, we say that the one-time signature scheme is secure.

    Although APAKE protocols have been researched for more than a decade, as far as we know, only two recent studies have focused on verifier-based setting [27,28]. However, we find that these protocols are not as secure as claimed, both of them are vulnerable to impersonation attacks.

    In 2016, Yang et al. [27] put forward the first verifier-based APAKE protocol and proved its security in the standard model. The proposed protocol, which achieves mutual authentication in only two rounds, is very efficient in terms of communication complexity.

    The construction of Yang et al.'s protocol is illustrated in Figure 1, which utilizes a CCA-secure labeled public key encryption scheme (KG1,Enc1,Dec1), a CPA-secure public key encryption scheme (KG2,Enc2,Dec2), and a password hashing scheme PHS=(PSetup,PPHSalt,PPreHash, PHSalt,PHash). Note that the definition of password hashing scheme used here follows the one provided in [37], which employs two salt-generating algorithms. Given two salts sP,sHZp, the pre-hash and hash values are generated as P=gsPπ and H=(H1,H2)=(gsP,PhsH).

    Figure 1.  The VAPAKE protocol presented in [23].

    Their protocol also uses two KV-SPHFs [34] for the following two languages,

    LC={(l,cC)|π,rC:c=Encl1(pk1,gπii;rC)H2i=Hπi1hsHi},
    LS={cSi|rS:cSi=Enc2(pk2,H2ihsHi;rS)}.

    We point out that Yang et al.'s protocol is vulnerable to an impersonation attack. Recall that the projection key hpC generated and sent by the client is protected by containing it in the label of the CCA-secure ciphertext cC. However, the projection key hpS sent by the server to the client is not in protected. This will lead to an impersonation attack in which an adversary impersonates the legitimate server by sending well-crafted message. More specifically, if the protocol is instantiated by Cramer-Shoup-like encryption schemes as that was presented in Section D of [27], the adversary could generate the message <hpS,{Aj,H1j}1jn> as follows. The projection key hpS is chosen to be hpS=(hpS1,hpS2,hpS3) where hpS1=fξ+1,hpS2=f,hpS3=g. Note that the adversary can eavesdrop the message sent by the client and get cC=Encl1(pk1,gπii;rC)=(u,v,e,w) where e=frCgπii. Then the adversary chooses a random rS, computes cSj=(uj,ej)=(grS,frS), Aj=(egj)cSj=frCgπii+jcSj, and sets H1j=1, for all 1jn.

    Upon receiving the above message, the client Ci will compute according to the protocol specification as follows. She first computes a projection hash value as (hpS1hpξS2)rChpπiS3=gπifrC. Then she computes cSi=Ai(hpS1hpξS2)rChpπiS3=AigπifrC=(grS,frS) and generates her session key as KC=(grS)α(frS)β. However, as the adversary has already obtained the projection key hpC=gαfβ from the first message, he can also compute the session key as KS=hprSC=(gαfβ)rS. This results in a successful impersonation attack.

    In 2018, Chen et al. [28] gave out a new verifier-based APAKE protocol by taking Zhang et al.'s algebraic MAC [20] as the server's verifier. With the help of hash functions, which would usually be recognized as random oracles (RO), this protocol performs much better than Yang et al.'s protocol [27], and is more efficient than most of the existed APAKE protocols in terms of computation and communication cost. It is claimed that this protocol is also secure against various known attacks, such as mutual authentication and forward secrecy.

    The concrete steps of Chen et al.'s protocol [28] is depicted in Figure 2. In the registration phase, each user Uj enrolls to the server S by sending IDj and mj=H(IDj||PWj), then the server S uses its secret key s to compute an algebraic MAC Vj=g1/(mj+s) as the corresponding verifier.

    Figure 2.  The VAPAKE protocol presented in [28].

    We find that Chen et al.'s protocol [28] is also vulnerable to an impersonation attack. An outside adversary who does not know any secret of the server and the client can impersonate a legitimate server to the client. The specific attack is as follows. When an adversary gets the first message <U,A,X> sent by some client Ui, he generates the second message by setting B=h1, Y=gy, Wj=A1, Cj=gy1, 1jn and K=Xy=gxy, VS=H(1||TRANS||Y||K). The adversary then sends the message <S,B,tbl,VS> to the client by pretending to be the legitimate server. When this message is received by the client, she will compute Y=(BaWi)miCi=(hag1/miha)migy1 =gy and K=Yx=gxy=K. As a consequence, all the subsequent verification will be successful and the adversary successfully impersonates the server.

    In this section, we give out a new verifier-based APAKE protocol constructed from standard cryptographic primitives such as public key encryption scheme, smooth projective hash functions and password hashing scheme. The underlying techniques are from [17,25,34,38], which explored SPHFs for complex languages dealing with anonymous and verifier-based authentication.

    The resulting protocol, depicted in Figure 3, is a 3-flow verifier-based APAKE protocol with explicit mutual authentication. We emphasize that, when the messages in boxes, i.e., τC,τS, are set to be empty strings and the last flow of message <τC> is removed like [38], one would get a 2-flow protocol but with only explicit unilateral authentication.

    Figure 3.  Our verifier-based APAKE protocol.

    Assume that G be a cyclic multiplicative group with prime order p, and g,h be its two random generators. Our construction uses an ElGamal encryption scheme E=(KGen,Enc,Dec), which takes g,h as its public key pk. The encryption on message MG with randomness r is computed as c=Enc(pk,M;r)=(u,e)=(gr,hrM). The construction also needs a PCA-secure public key encryption scheme E=(KGen,Enc,Dec) and a one-time signature Σ=(SignKG,Sign,Verify), which could be instantiated arbitrarily. We emphasize that, the public keys of public key encryption schemes are contained in the common reference string as [5,33], thus no PKI is needed here.

    Our construction also uses an algebraic password hashing scheme proposed by Benhamouda et al. [25], where param=g||G||F(), P=PPreHash(param,π)=gF(π), s=PSalt(param)RG, and H=PHash(param,s,π)=sF(π), where F() is a hash function from the password dictionary to Zp. Given a salt s and a password hashing value H, we define the following complex language

    Ls.H={(u,e)|r,π,u=gr,e=hrgF(π),H=sF(π)}, (1)

    which could be seem as the set of ciphertexts of a pre-hash value that is consistent with the password hashing value H. By exploiting the technique of [25], we also construct the following SPHF system H. The hash key is generated as hk=HashKG(Ls,H)=(x,y,z)RZ3p; the projection key is computed as hp=ProjKG(Ls,H,hk,c)=(hp1,hp2)=(gxhy,gysz). The hash value could be computed through hk as h=Hash(Ls,H,hk,c)=uxeyHz. It could also be generated by using the projection key hp and a pair of witnesses r,π as h=ProjH(Ls,H,hp,c,r,π)=hpr1hpF(π)2.

    Let Γ={Cj}1jn denote a set of legitimate clients and n denote the set size. Assume that each client Ci∈Γ holds a password πi, thus it could pre-compute Pi=gF(πi); assume that the server S holds the verifiers pwS={sj,Hj}1jn for all the clients. Suppose a client Ci∈Γ wants to establish a session key with the server S in an anonymous way, the verifier-based APAKE protocol proceeds as follows.

    (1) The client Ci∈Γ selects a random number rZp and computes an ElGamal ciphertext of its pre-hash value Pi=gF(πi) as ci=Enc(pk,Pi;r)=(u,e)=(gr,hrPi). Then she sends the message <S,ci> to the server.

    (2) Upon receiving the message <S,ci>, the server first does the following computations for each index 1jn. He chooses random hkj=(xj,yj,zj)RZ3p, computes the projection key as hpj=(hpj1,hpj2)=(gxjhyj,gyjszj) and the hash values as tkj||tpj=Hash(Ls,H,hkj,ci)=uxjeyjHzjj. Note that, similar to [38], the hash value is divided into two substrings for subsequent use. Next, the server S computes δj=tp1tpj,τS||skS=tp1, sets hp=(hp1,,hpn,δ2,,δn), and generates a signing/ verification key pair as (SK,VK)=SignKG(1k). Then, he sets label=S||ci||hp||VK and computes a ciphertext as cj=Enc(pk,sj||Hj;label;tkj) where the random string is the first part of the SPHF's hash value. After that, the server sets c=(s1,sn,c1,c2,,cn), signs it with his signing key SK as σ=Sign(SK,c) and sends <hp,VK,c,σ> to the server.

    (3) When the client Ci receives the message, she first verifies the validity of the signature σ. If the verification is successful, the client computes the SPHF's hash value by using her witnesses r,πi as ~tki||~tpi=ProjH(hpi,ci,r,πi)=hpri1hpF(πi)i2. Next, the client sets label=S||ci||hp||VK, computes Hi=sF(πi)i and checks whether it holds ci=Enc(pk,si||Hi;label;~tki). Note that only the i-th ciphertext is recomputed but the whole vector c is guaranteed unmodified, because the verify key VK is contained in the label. Then, the client recovers the value tp1 as follows: if i=1, this values is already known; if i2, she would compute it as ~tpiδi. Denote the value obtained by the client as tp. Finally, the client divides tp into two parts as τC||skC=tp, sets its session key as skC and sends τC to the server as an authentication value.

    (4) While the message <τC> is received, the server S verifies this value by checking whether τC=τS holds. If the message passes the check, the server will complete the session and set his session key as skS.

    We stress that if a verification conducted by the client (the server) fails, she (or he) will abort the session immediately.

    The construction of our verifier-based APAKE protocol takes the Groce-Katz framework [38] of traditional PAKE protocols as a starting point. This framework achieves mutual authentication in 3 flows of communication, or alternatively unilateral authentication in 2 flows. Although the Groce-Katz framework does not achieve the optimal rounds for PAKE protocols, it enjoys the advantage of a high computational efficiency as the encryption scheme adopted by the client side only needed to be CPA secure instead of CCA secure. More precisely, the Groce-Katz framework is more efficient in terms of computation than those one-round PAKE protocols presented in [6,34]. As a consequence, the resulting verifier-based APAKE protocol is also computationally efficient.

    In order to achieve anonymity by utilizing SPHFs, we let the server generate a sequence of projection keys for each possible client, i.e., for each language Lsj,Hj,1jn. The smooth property of the SPHF system guarantees that only when the ciphertext ci matches the languages Lsi,Hi, the hash value could be reconstructed by the client by using the projection key; otherwise, it is totally random to her. However, since only one of these projection keys is actually used by the client, special attention should be paid to the protection of these projection keys. We address this problem by containing them in the labels of a CCA-secure public encryption scheme and binding these ciphertext together with a one-time signature.

    For the purpose of checking the verifiers in an implicit way, we choose to use the algebraic password hashing scheme proposed by Benhamouda et al. [25]. Recall that the pre-hash value P and the hash value Hj are with the same exponent with respect to bases g and sj respectively. Henceforth the server could prove this fact by selecting a projective hash key of the form gyjszjj. Furthermore, this password hashing scheme meets all the security notions presented in Section 3.2, including tight one-wayness. On the contrary, although the password hashing scheme [37] utilized in Yang et al.'s protocol [27] is also an algebraic one, it is not tightly one-way as claimed [25].

    In this section, we first analyze the security of the verifier-based APAKE protocol heuristically. Then, we give out a rigorous security proof within the security model presented in Section 2.

    In this subsection, we show that the new protocol guarantees typical security goals for verifier-based APAKE protocols and resists various known attacks.

    (1) Resistance to off-line dictionary attacks. In the protocol, the passwords of clients only appear in the CPA-secure ciphertext ci generated by the client or those CCA-secure ciphertexts cj,1jn generated by the server. According to the semantic security of these public key encryption schemes, an adversary cannot mount an off-line dictionary attack on them. On the other hand, the smoothness property of the SPHF system guarantees that, except for negligible probability, no information of the passwords could be obtained by the adversary from the outputs of the SPHFs. Hence, the adversary cannot conduct off-line dictionary attacks.

    (2) Mutual authentication. Recall that the ciphertext ci generated by the server using a substring tki derived from the SPHF hash value as its randomness. If the server holds the right verifier (si,Hi) corresponding to the client's password πi, the correctness property of the SPHF system would guarantee that this value can be recomputed by the client. However, if the client's password and the server's i-th verifier are not consistent, they will get different tki. Therefore, the ciphertext ci ensures the authentication from the server to the client. In addition, the message τC is used as an authenticator from the client to the server. Hence, we conclude that this protocol provides explicit mutual authentication.

    (3) Client anonymity. The server generates a projective key hpj and computes a SPHF hash value for each of the potential client. No matter which client is involved in the communication by using the correct password, she will compute the same SPHF hash value as the server. Meanwhile, the server cannot detect the actual identity of the client since the same substring tp1 is used by any client Ci∈Γ for client's authentication and the final session key's generation.

    (4) Security against stolen-verifier attack. If the server is compromised and the verifiers are leaked, the adversary would obtain all tuples {sj,Hj}1jn. It is obvious that the best way for the adversary to derive the password from Hj=sF(πj)j is to mount a brute-force guessing attack. Additionally, since different bases are used for different client, the adversary can only guess the password one by one. In fact, the above security is actually guaranteed by the tight one-wayness of the underlying password hashing scheme.

    In this subsection, we prove that the 2-flow version of our verifier-based APAKE protocol satisfies the AKE security and anonymity defined in the security model presented in Section 2. It is obvious that the 3-flow version will additionally provide explicit client authentication by sending the last authenticating message to the server.

    Theorem 1. Assume that (KGen,Enc,Dec) is the ElGamal encryption scheme which is CPA secure, (KGen,Enc,Dec) is a labeled public key encryption scheme with PCA security [31], (SignKG,Sign,Verify) is an existential unforgeable one-time signature, and the SPHF system and password hashing scheme are secure. Then, the verifier-based APAKE protocol presented in Section 4.2 guarantees AKE security. More specifically, the advantage of any adversary A against the AKE security in the security model is

    AdvAKEP(A)Cqssend+(qexe+qsend)(AdvcpaE(t)+nAdvpcaE(t)+nεSPHF(k))+AdvEUFΣ(t), (2)

    where t is the maximum running time of the adversary A, qsend,qexe are the maximum number of Execute and Send queries asked by A, AdvcpaE(t),AdvpcaE(t),AdvEUFΣ(t) denote the adversaries' advantages against the encryption scheme E,E and the one-time signature Σ, εSPHF(k) denotes a negligible upper bound of the statistical distance involved in the smoothness definition of the SPHF system, where C and s are the Zipf parameters [1,29].

    Proof. The proof consists of a sequence of incrementally changed games G0,G1,,G9, starting from the game G0 representing the real attack in the security model, and ending with a game G9 in which the adversary cannot get any information of the passwords from the session keys and the exchanging messages. For this purpose, we will modify the simulation of Execute and Send queries step by step. Denote by Advk(A) the adversary's advantage in the k-th game. Denote by Send0(Cρi,start) the first send query to start the ρ-th session Cρi of some client CiC, and denote by Send1(Sδ,<S,ci>) and Send2(Cρi,<hp,VK,c,σ>) the queries relative to the first and second message respectively. Furthermore, assume that the simulator maintains a list of the form PWList={(Pj,sj,Hj)}1jn recording the compatible password and verifier pair registered by all honest clients.

    Game G0: This game is the real attack as defined in Section 2, where the simulator simulates all the honest sessions and all the queries asked by the adversary are answered honestly. Thus, we have

    AdvAKEP(A)=Adv0(A). (3)

    Game G1: In this game, we begin to modify the way Execute queries between honest client and server sessions are answered. When a query of the form Execute(Cρ,Sδ) is received, the simulator first discriminates whether the client C and the server S hold compatible passwords, through checking whether the corresponding tuple (P,s,H) appears in the list PWList.

    (1) If they hold incompatible passwords, we simply let the client session abort. Note that the client session indeed aborts in this situation because of the smooth property of the SPHF system.

    (2) If they hold compatible passwords, the simulator computes the SPHF value from the client side as ~tki||~tpi=tkj||tpj=Hash(Ls,H,hkj,ci), and removes the verifying process of the signature σ and the ciphertext ci. The correctness property of the SPHF system guarantees that these modifications do not alter the adversary's view at all. Therefore, Adv1(A)=Adv0(A).

    Game G2: In this game, we continue to modify the way Execute queries are answered, through replacing the ciphertext ci by an encryption corresponding to a dummy password π0 as ci=Enc(pk,P0;r) where P0=gF(π0) and π0 is not contained in the password dictionary. Because the encryption scheme E is CPA-secure, the ciphertexts of Pi and P0 are indistinguishable. Consequently, one can easily bound the gap of the adversary's advantage in these two games as

    |Adv2(A)Adv1(A)|qexeAdvcpaE(t) (4)

    via a classical hybrid argument.

    Game G3: This game replaces the SPHF values tkj||tpj,1jn by truly random strings. Since the ciphertext ci no longer belongs to the language Ls.H according to the above game, we could bound the change of the adversary's advantage via resorting to the smoothness property of the SPHF system and the hybrid technique. Note that there are at most qexen Execute queries are modified in this game. Thus, it can be concluded that

    |Adv3(A)Adv2(A)|qexenεSPHF(k). (5)

    Game G4: In this game, we replace the ciphertext cj by an encryption corresponding to a dummy password π0 as cj=Enc(pk,sj||Hj,0;label;tkj), where Hj,0=sF(π0)j, for all 1jn. Owing to the PCA security of the encryption scheme E, which implies CPA security as well [31], the advantage gap caused by replacing one of the above ciphertext is at most AdvpcaE(t). As a result of this fact, with the aid of a classical hybrid argument, the overall difference of the adversary's advantage in these two games is at most

    |Adv4(A)Adv3(A)|qexenAdvpcaE(t). (6)

    Game G5: Till now, we have finished the modification of Execute queries. Before modifying the Send queries, we first exclude the situations that the adversary forges a valid signature with respect to the one-time signature scheme. Denote by AdvEUFΣ(t) the advantage of the adversary against the one-time signature. Then, we can conclude that the gap of advantages caused by the above modification is at most AdvEUFΣ(t).

    Game G6: From now on, we will begin to modify the Send queries. In this game, we first modify the way how Send2 queries are answered. If a query of the form Send2(Cρi,<hp,VK,c,σ>) is sent to a client session Cρi in the name of a server session Sδ, the simulator first gets the verifier (si,Hi) corresponding to the client Ci via retrieving the list PWList. We say that the message <hp,VK,c,σ> is match-session-generated, if it was outputted by Sδ as an answer to the Send1(Sδ,<S,ci>) query and <S,ci> is exactly the message outputted by Cρi as an answer to a Send0 query.

    (1) If the message is not match-session-generated, the simulator checks through its PCA oracle whether (ci,si,Hi) is valid. If it is valid, we simply let the adversary win the game and denote this event by Win1; if it is not, we let the client directly abort this session.

    (2) If the message is match-session-generated, the simulator checks whether (si,Hi) obtained above is compatible with the verifier held by the server session. If they are compatible, the simulator answers the query as in game G1, computing the SPHF value from the client side as ~tki||~tpi=tkj||tpj=Hash(Ls,H,hkj,ci), and removes the verification process against the ciphertext ci; If they are compatible, we let the client directly abort this session.

    Note that except the event Win1 happens, modification in this game does not affect the adversary's advantage. Hence the advantage of the adversary satisfies Adv5(A)Adv6(A).

    Game G7: This game modifies the way Send0 queries are answered, through replacing the ciphertext ci by an encryption corresponding to a dummy password π0. Similar to the analysis in game G2, we could bound the advantage gap as

    |Adv7(A)Adv6(A)|qsendAdvcpaE(t). (7)

    Game G8: In this game, we change the simulation of Send1 queries as follows. If the message <S,ci> is generated by some honest client session or is generated by the adversary in the name of some honest client session but with incompatible password, the simulator replaces the SPHF values tkj||tpj,1jn by truly random strings. Similar to the analysis in game G3, the advantage gap between this game and the last one is at most

    |Adv8(A)Adv7(A)|qsendnεSPHF(k). (8)

    Game G9: This game continues the modification of Send1 queries. Upon receiving a message <S,ci> that is generated by the adversary in the name of some client session Cρi, where Ci and S hold incompatible passwords, we simply let the adversary win the game and denote this event by Win2. As a consequence, Adv8(A)Adv9(A).

    Game G10: In this game, similar to game G4, we replace the ciphertext cj by an encryption corresponding to a dummy password π0 as cj=Enc(pk,sj||Hj,0;label;tkj), where Hj,0=sF(π0)j, for all 1jn. Recall that the adversary needs the access to the PCA oracles since in game G6. By utilizing a classical hybrid argument, we could estimate the advantage gap as

    |Adv10(A)Adv9(A)|qsendnAdvpcaE(t) (9)

    In the last game G10, all the messages and session keys are changed such that no information of the passwords is included. Thus, the adversary can only win the game on the case that the events win1 or win2 happens. Recall that all the passwords are chosen at random but not actually used, the probability that events win1 or win2 happens is bounded by Cqssend, , where C and s are the Zipf parameters [1,29]. To sum up, the global advantage of any adversary is bounded by the inequality (2) in the theorem.

    Theorem 2. Based on the same assumptions as theorem 1, the verifier-based APAKE protocol guarantees client anonymity against the honest-but-curious server.

    Proof. Note that the adversary against the client anonymity is considered to be an honest-but-curious one. We also recall that in the proof of theorem 1, all the messages outputted by Execute,Send queries have been incrementally changed into messages and ciphertexts corresponding to the same dummy password π0. Henceforth, no matter which client is actually involved in the protocol, by following the similar steps as in game G1 to G4, we can prove that the adversary's view is subject to the same distribution. In other words, for any two clients Ci, Cj∈Γ, the two distributions Πi,Πj are identical to each other, thus are computational distinguishable.

    In this section, we compare the proposed verifier-based APAKE protocol with other representative verifier-based APAKE, as well as PAKE, protocols, in terms of both security and efficiency.

    Table 1.  Performance comparisons.
    Protocol type Security model Resistance to impersonation attacks Number of rounds Client computation Server computation
    Benhamouda et al. [25] V-PAKE standard Yes 2 3 E + 4 DE 2 E + 4 DE
    Hu et al. [17] APAKE standard Yes 3 4E + 3 DE 3n E + 3n DE
    Chen et al. [28] V-APAKE ROM No 3 6 E (2n+3) E
    Yang et al. [27] V-APAKE standard No 2 3 E + 4 DE 2n E + 4n DE
    Ours protocol V-APAKE standard Yes 2 4 E + 2 DE 2n E + 4n DE

     | Show Table
    DownLoad: CSV

    The comparison results are presented in Table 1. The protocol type indicates the concrete type of the protocol, where V-PAKE, APAKE and V-APAKE are abbreviation of verifier-based PAKE, anonymous PAKE, and verifier-based anonymous PAKE respectively. The client and server computation stand for the main computational costs required by the client side and server side, where E denotes the time needed for computing one exponentiation and DE denotes the time needed for the computation of a double-exponentiation or multi-exponentiation.

    As show in Table 1, our protocol is the only secure verifier-based APAKE protocol, while the verifier-based APAKE protocols in [27,28] are both vulnerable to impersonation attacks. The protocol requires only 2 rounds of communication, which is quite efficient compared to other protocols. When it comes to computational costs, the new protocol enjoys considerable efficiency in terms of number of exponentiations and double-exponentiations. The computational cost needed on the server side is almost equal to those in [17,27], and the cost on the client side is less than those in [17,25,27] thanks to the application of the PCA-secure encryption instead of CCA-secure encryption. Although Chen et al.'s protocol [28] is more efficient than ours, but it depends on the ROM in depth. On the contrary, our protocol is provably secure in the standard model.

    In this paper, we first show that two recently proposed verifier-based APAKE protocols are vulnerable to impersonation attacks, thus does not reach their security goals. Then, we put forward a new verifier-based APAKE protocol based on implicitly checking the validity of the verifier via smooth projective hash functions for complex languages. The new protocol is with provable security in the standard model, and enjoys considerable computation and communication efficiency.

    This work was supported in part by the National Nature Science Foundation of China under Grants Nos. 61702549, 61862011, 61872449, and in part by Guangxi Natural Science Foundation under Grant No. 2018GXNSFAA138116 and the Guangxi Key Laboratory of Cryptography and Information Security under Grant No. GCIS201704, and in part by Foundation of Science and Technology on Information Assurance Laboratory under Grant No. KJ-17-001.

    The authors declare that they have no conflict of interest.

    [1] Bortolussi R (2008) Listeriosis: A Primer. Can Med Assoc J 179: 795–7. doi: 10.1503/cmaj.081377
    [2] Vázquez-Boland JA, Kuhn M, Berche P, et al. (2001) Listeria pathogenesis and molecular virulence determinants. Clin Microbiol Rev 14: 584–640. doi: 10.1128/CMR.14.3.584-640.2001
    [3] Weller D, Andrus A, Wiedmann M, et al. (2015) Listeriabooriae sp. nov. and Listeria newyorkensis sp. nov., from food processing environments in the USA. Int J Syst Evol Micr 65: 286–292.
    [4] Hernandez-Milian A, Payeras-Cifre A (2014) What is new in listeriosis? Biomed Res Int 2014: 358051.
    [5] WHO Working Group (1988) Foodborne listeriosis. Bulletin of the World Health Organization, 66: 421–428.
    [6] De Valk H, Jacquet C, Goulet V, et al. (2005) Surveillance of Listeria infections in Europe. Euro Surveill 10: 572.
    [7] Travier L, Lecuit M (2014) Listeria monocytogenes ActA: a new function for a ‘classic’ virulence factor. Curr Opin Microbiol 17: 53–60. doi: 10.1016/j.mib.2013.11.007
    [8] Lianou A, Sofos JN (2007) A review of the incidence and transmission of Listeria monocytogenes in ready-to-eat products in retail and food service environments. J Food Prot 70: 2172–2198.
    [9] Gottlieb SL, Newbern EC, Griffin PM, et al. (2006) Multistate outbreak of listeriosis linked to turkey deli meat and subsequent changes in US regulatory policy. Clin Infect Dis 42: 29–36. doi: 10.1086/498113
    [10] WHO/FAO (2004) Risk assessment of Listeria monocytogenes in ready-to-eat foods: technical report. Available from: ftp: //ftp.fao.org/docrep/fao/010/y5394e/y5394e.pdf.
    [11] De Noordhout CM, Devleesschauwer B, Angulo FJ, et al. (2014) The global burden of listeriosis: a systematic review and meta-analysis. The Lancet Infectious Diseases 14: 1073–1082. doi: 10.1016/S1473-3099(14)70870-9
    [12] Goulet V, Jacquet C, Vaillant V, et al. (1995) Listeriosis from consumption of raw-milk cheeses. Lancet 345: 1581–1582.
    [13] Siegman-Igra Y, Levin R, Weinberger M, et al. (2002) Listeria monocytogenes infection in Israel and review of cases worldwide. Emerg Infect Dis 8: 305–310. doi: 10.3201/eid0803.010195
    [14] Aureli P, Giovanni C, Caroli D, et al. (1997) An outbreak of febrile gastro-enteritis associated with corn contaminated by Listeria monocytogenes. N Engl J Med 243: 1236–41.
    [15] Ericsson H, Eklow A, Danielsson-Tham ML, et al. (1997) An outbreak of listeriosis suspected to have been caused by rainbow trout. J Clin Microbiol 35: 2904–2907.
    [16] Lyytikäinen O, Autio T, Maijala R, et al. (2000) An outbreak of Listeria monocytogenes serotype 3a infections from butter in Finland. J Infect Dis 181: 1838–1841. doi: 10.1086/315453
    [17] Kathariou S, Graves L, Buchrieser C, et al. (2006) Involvement of closely related strains of a new clonal group of Listeria monocytogenes in the 1998-99 and 2002 multistate outbreaks of foodborne listeriosis in the United States. Foodbourne Pathog Dis 3: 292–302. doi: 10.1089/fpd.2006.3.292
    [18] Dauphin G, Ragimbeau C, Malle P (2001) Use of PFGE typing for tracing contamination with Listeria monocytogenes in three cold-smoked salmon processing plants. Intl J Food Microbiol 64: 51–61. doi: 10.1016/S0168-1605(00)00442-6
    [19] Makino SI, Kawamoto K, Takeshi K, et al. (2005) An outbreak of food-borne listeriosis due to cheese in Japan, during 2001. Intl J Food Microbiol 104: 189–196. doi: 10.1016/j.ijfoodmicro.2005.02.009
    [20] deValk H, Jacquet C, Goulet V, et al. (2005) Surveillance of Listeria infections in Europe. Euro Surveill. 10: 572.
    [21] McIntyre L, Wilcott L, Monika N (2015) Listeriosis Outbreaks in British Columbia, Canada, Caused by Soft Ripened Cheese Contaminated from Environmental Sources, Biomed Res Int 2015: 131623.
    [22] Mead PS, Dunne, EF, Graves L, et al. (2006) Nationwide outbreak of listeriosis due to contaminated meat. Epidemiol Infect 134: 744–751. doi: 10.1017/S0950268805005376
    [23] Bille J, Blanc DS, Schmid H, et al. (2005) Outbreak of human listeriosis associated with tomme cheese in northwest Switzerland 2005. Euro surveillance: bulletin Europeensur les maladies transmissibles. European communicable disease bulletin 11: 91–93.
    [24] Pichler J, Much P, Kasper S, et al. (2009) An outbreak of febrile gastroenteritis associated with jellied pork contaminated with Listeria monocytogenes. Wiener Klinishe Woschenschcrift 121: 149. doi: 10.1007/s00508-009-1137-3
    [25] Koch J, Dworak R, Prager R, et al. (2010) Large listeriosis outbreak linked to cheese made from pasteurized milk, Germany, 2006-2007. Foodborne Pathog Dis 7: 1581–1584. doi: 10.1089/fpd.2010.0631
    [26] Currie A, Farber JM, Nadon C, et al. (2015) Multi-province listeriosis outbreak linked to contaminated deli meat consumed primarily in institutional settings, Canada, 2008. Foodborne Pathog Dis 12: 645–652. doi: 10.1089/fpd.2015.1939
    [27] Friesema IH, Kuiling S, van der Ende A, et al. (2015) Risk factors for sporadic listeriosis in the Netherlands, 2008 to 2013. EuroSurveill 20: 21199. doi: 10.2807/1560-7917.ES2015.20.31.21199
    [28] Pichler J, Appl G, Pietzka A, et al. (2011) Lessons to be learned from an outbreak of foodborne Listeriosis, Austria 2009–2010. Food Protection Trends 31: 268–273.
    [29] Popovic I, Heron B, Covacin C (2014) Listeria: an Australian perspective (2001–2010). Foodborne Pathog Dis 11: 425–432. doi: 10.1089/fpd.2013.1697
    [30] Gaul LK, Farag NH, Shim T, et al. (2013) Hospital-acquired listeriosis outbreak caused by contaminated diced celery—Texas, 2010. Clin Infect Dis 56: 20–26.
    [31] Yde M, Naranjo M, Mattheus W, et al. (2012) Usefulness of the European Epidemic Intelligence Information System in the management of an outbreak of listeriosis, Belgium, 2011. Euro Surveill 17: 20279.
    [32] McCollum JT, Cronquist AB, Silk BJ, et al. (2013) Multistate outbreak of listeriosis associated with cantaloupe. New England Journal of Medicine 369: 944–953. doi: 10.1056/NEJMoa1215837
    [33] Nyenje ME, Tanih NF, Green E, et al. (2012) Current status of antibiograms of Listeria ivanovii and Enterobacter cloacae isolated from ready-to-eat foods in Alice, South Africa. Int J Env Res Pub Heal 9: 3101–3114. doi: 10.3390/ijerph9093101
    [34] Park MS, Wang J, Park JH, et al. (2014) Analysis of microbiological contamination in mixed pressed ham and cooked sausage in Korea. J Food Protect 77: 412–418. doi: 10.4315/0362-028X.JFP-13-322
    [35] MCID (2014) Macedonian Committee on Infectious Diseases. Available from: http: //www.independent.mk/articles/7492/Dangerous+Bacteria+in+Macedonia+Three+People+Died+of+Listeria.
    [36] Whitworth J (2015) Public Health England reports Listeria rise. Available from: http: //www.foodqualitynews.com/Food-Outbreaks/Listeria-cases-increase-by-5.
    [37] CDC (2015) Multistate Outbreak of Listeriosis Linked to Commercially Produced, Prepackaged Caramel Apples.
    [38] CDC (2016) Multistate Outbreak of Listeriosis Linked to Packaged lettuce Salads.
    [39] Bhunia A (2008) Listeria monocytogenes. Foodborne Microbial Pathogens. pp. 165–182.
    [40] Adzitey F, Huda N (2010) Listeria monocytogenes in foods: incidences and possible control measures. Afr J Microbiol Res 4: 2848–2855.
    [41] Lomonaco S, Nucera D, Filipello V (2015) The evolution and epidemiology of Listeriamonocytogenes in Europe and the United States. Infect Genet Evol 35: 172–183. doi: 10.1016/j.meegid.2015.08.008
    [42] Bennett L (2000) “Listeria monocytogenes” in Mandell, Douglas, & Bennett’s Principles and Practice of Infectious diseases, Fifth Edition, Chap. 195, pp. 2208-14 In: Mandell, Bennett, and Dolan, 3 Eds.
    [43] CDC (2011) Centre for Disease Control, National Center for emerging and Zoonotic infectious diseases. Available from: http: //www.cdc.gov/ncezid/what-we-do/our-work-our-stories.html
    [44] Mead PS, Slutsker L, Dietz V, et al. (1999) Food-related illness and death in the United States. Emerg Infect Dis 5: 607. doi: 10.3201/eid0505.990502
    [45] Ireton K (2006) Listeria monocytogenes. In Bacterial Genomes and Infectious Diseases. 3 Eds., Totowa, NJ: Humana Press, pp. 125–149.
    [46] CDC (2014). Center for Disease Control and Prevention. Available from: http: //www.cdc.gov/outbreaknet/outbreaks.html.
    [47] Kemmeren JM, Mangen MJ, van Duynhoven YT, et al. (2006) Priority setting of foodborne pathogens. Disease burden and costs of selected enteric pathogens. Available from: http: //www.rivm.nl/bibliotheek/rapporten/330080001.pdf.
    [48] Ivanek R, Grohn YT, Tauer LW, et al. (2004) The cost and benefit of Listeria monocytogenes food safety measures. Crit Rev Food Sci 44: 513–23.
    [49] Thomas MK, Vriezen R, Farber JM, et al. (2015) Economic Cost of a Listeria monocytogenes Outbreak in Canada, 2008. Foodborne Pathog Dis 12: 966–971. doi: 10.1089/fpd.2015.1965
    [50] USDA/FSIS (2003) Quantitative assessment of relative risk to public health from foodborne Listeria monocytogenes among selected categories of ready-to-eat foods. Food and Drug Administration, United States Department of Agriculture, Centers for Disease Control and Prevention, p. 541. Available from: http: //www.fda.gov/Food/FoodScienceResearch/ RiskSafetyAssessment/ucm183966.htm.
    [51] Maskeroni C (2012) Deli Meat 101: What’s really in your sandwich? http: //www.builtlean.com/2012/04/03/deli-meat/.
    [52] Bohaychuk VM, Gensler GE, King RK, et al. (2006) Occurrence of pathogens in raw and ready-to-eat meat and poultry products collected from the retail marketplace in Edmonton, Alberta, Canada J Food Prot 69: 2176–2182.
    [53] Yang S, Pei X, Wang G, et al. (2016) Prevalence of food-borne pathogens in ready-to-eat meat products in seven different Chinese regions. Food Control 65: 92–98. doi: 10.1016/j.foodcont.2016.01.009
    [54] Dominguez C, Gomez I, Zumalacarregui J (2001) Prevalence and contamination levels of Listeria monocytogenes in smoked fish and pâté sold in Spain. J Food Prot 64: 2075–2077.
    [55] Fantelli K, Stephan R (2001) Prevalence and characteristics of shigatoxin-producing Escherichia coli and Listeria monocytogenes strains isolated from minced meat in Switzerland. Int J Food Microbiol 70: 63–69. doi: 10.1016/S0168-1605(01)00515-3
    [56] Uyttendaele M, Busschaert P, Valero A, et al. (2009) Prevalence and challenge tests of Listeria monocytogenes in Belgian produced and retailed mayonnaise-based deli-salads, cooked meat products and smoked fish between 2005 and 2007. Intl J Food Microbiol 133: 94–104. doi: 10.1016/j.ijfoodmicro.2009.05.002
    [57] Lambertz ST, Nilsson C, Brådenmark A, et al. (2012) Prevalence and level of Listeriamonocytogenes in ready-to-eat foods in Sweden 2010. Intl J Food Microbiol 160: 24–31. doi: 10.1016/j.ijfoodmicro.2012.09.010
    [58] Garrido V, Vitas AI, García-Jalón I (2009) Survey of Listeria monocytogenes in ready-to-eat products: prevalence by brands and retail establishments for exposure assessment of listeriosis in Northern Spain. Food Control 20: 986–991.
    [59] Kramarenko T, Roasto M, Meremäe K, et al. (2013) Listeria monocytogenes prevalence and serotype diversity in various foods. Food Control 30: 24–29. doi: 10.1016/j.foodcont.2012.06.047
    [60] Little CL, Sagoo SK, Gillespie IA, et al. (2009) Prevalence and level of Listeria monocytogenes and other Listeria species in selected retail ready-to-eat foods in the United Kingdom. J Food Protect 72: 1869–1877.
    [61] Cabedo L, Picart I, Barrot L, et al. (2008) Prevalence of Listeria monocytogenes and Salmonella in ready-to-eat food in Catalonia, Spain. J Food Protect 71: 855–859.
    [62] Di Pinto A, Novello L, Montemurro F, et al. (2010) Occurrence of Listeria monocytogenes in ready-to-eat foods from supermarkets in Southern Italy. New Microbiologica 33: 249–252.
    [63] Yu T, Jiang X (2014) Prevalence and characterization of Listeria monocytogenes isolated from retail food in Henan, China. Food Control 37: 228–231. doi: 10.1016/j.foodcont.2013.09.047
    [64] Mataragas M, Zwietering MH, Skandamis PN, et al. (2010) Quantitative microbiological risk assessment as a tool to obtain useful information for risk managers—specific application to Listeria monocytogenes and ready-to-eat meat products. Intl J Food Microbiol 141: S170–S179. doi: 10.1016/j.ijfoodmicro.2010.01.005
    [65] Pradhan AK, Ivanek R, Gröhn YT, et al. (2011) Comparison of public health impact of Listeria monocytogenes product-to-product and environment-to-product contamination of deli meats at retail. J Food Protect 74: 1860–1868. doi: 10.4315/0362-028X.JFP-10-351
    [66] Syne SM, Ramsubhag A, Adesiyun AA (2011) Occurrence and genetic relatedness of Listeria spp. in two brands of locally processed ready-to-eat meats in Trinidad. Epidemiol Infect 139: 718–727.
    [67] Cho KM, Kambiranda DM, Kim SW, et al. (2008) Simultaneous Detection of Food-borne Pathogenic Bacteria in Ready-to-eat Kimbab Using Multiplex PCR Method. Food Sci Biotechnol 17: 1240–1245.
    [68] Castañeda-Ruelas GM, Castro-del Campo N, Félix JL, et al. (2013) Prevalence, levels, and relatedness of Listeria monocytogenes isolated from raw and ready-to-eat foods at retail markets in Culiacan, Sinaloa, Mexico. J Microbiol Res 3: 92–98.
    [69] Olsen SJ, Patrick M, Hunter SB, et al. (2005) Multistate outbreak of Listeriamonocytogenes infection linked to delicatessen turkey meat. Clin Infect Dis 40: 962–967. doi: 10.1086/428575
    [70] Gibbons IS, Adesiyun A, Seepersadsingh N, et al. (2006) Investigation for possible sources of contamination of ready-to-eat meat products with Listeria spp. and other pathogens in a meat processing plant in Trinidad. Food Microbiol 23: 359–366.
    [71] USDA/FSIS (2010) Comparative risk assessment for Listeria monocytogenes in RTE meat and poultry deli meats. Available from: http: //www.fsis.usda.gov/shared/PDF/Comparative_ RA_Lm_Report_May2010.pdf
    [72] CDC (2016) Retail Deli Slicer Cleaning Frequency—Six Selected Sites, United States, 2012. MMWR-Morbid Mortal W 65: 306–310. doi: 10.15585/mmwr.mm6512a2
    [73] Chatelard-Chauvin C, Pelissier F, Hulin S, et al. (2015) Behaviour of Listeria monocytogenes in raw milk Cantal type cheeses during cheese making, ripening and storage in different packaging conditions. Food Control 54: 53–65. doi: 10.1016/j.foodcont.2015.01.007
    [74] Brooks JC, Martinez B, Stratton J, et al. (2012) Survey of raw milk cheeses for microbiological quality and prevalence of foodborne pathogens. Food Microbiology 31: 154–158. doi: 10.1016/j.fm.2012.03.013
    [75] Gebretsadik S, Kassa T, Alemayehu H, et al. (2011) Isolation and characterization of Listeria monocytogenes and other Listeria species in foods of animal origin in Addis Ababa, Ethiopia. J Infect Public Heal 4: 22–29. doi: 10.1016/j.jiph.2010.10.002
    [76] Pintado CMBS, Oliveira A, Pampulha ME, et al. (2005) Prevalence and characterization of Listeria monocytogenes isolated from soft cheese. Food Microbiol 22: 79–85. doi: 10.1016/j.fm.2004.04.004
    [77] Guerra MM, McLauchlin J, Bernardo FA (2001) Listeria in ready-to-eat and unprocessed foods produced in Portugal. Food Microbiol 18: 423–429. doi: 10.1006/fmic.2001.0421
    [78] Vitas AI, AguadoV, Garcia-Jalon I (2004) Occurrence of Listeria monocytogenes in fresh and processed foods in Navarra (Spain). Int J Food Microbiol 90: 349–356. doi: 10.1016/S0168-1605(03)00314-3
    [79] Akpolat NO, Elci S, Atmaca S, et al. (2004) Listeria monocytogenes in products of animal origin in Turkey. Vet Res Commun 28: 561–567. doi: 10.1023/B:VERC.0000042872.07616.18
    [80] Colak H, Hampikyan H, Bingol EB, et al. (2007) Prevalence of L. monocytogenes and Salmonella spp. in tulum cheese. Food Control 18: 576–579.
    [81] Abrahão WM, Abrahão PRDS, Monteiro CLB, et al. (2008) Occurrence of Listeria monocytogenes in cheese and ice cream produced in the State of Paraná, Brazil. Revista Brasileira de Ciências Farmacêuticas 44: 289–296. doi: 10.1590/S1516-93322008000200014
    [82] Arslan S, Özdemir F (2008) Prevalence and antimicrobial resistance of Listeria spp. in homemade white cheese. Food Control 19: 360–363.
    [83] Moreno-Enriquez RI, Garcia-Galaz A, Acedo-Felix E, et al. (2007) Prevalence, types, and geographical distribution of Listeria monocytogenes from a survey of retail queso fresco and associated cheese processing plants and dairy farms in Sonora, Mexico. J Food Protect 70: 2596–2601.
    [84] Aygun O, Pehlivanlar S (2006) Listeria spp. in the raw milk and dairy products in Antakya, Turkey. Food Control 17: 676–679.
    [85] Derra FA, Kalsmose S, Monga DP, et al. (2013) Occurrence of Listeria spp. in retail meat and dairy products in the area of Addis Ababa, Ethiopia. Foodborne Path Dis 10: 577–579.
    [86] Gombas DE, Chen Y, Clavero RS, et al. (2003) Survey of Listeria monocytogenes in ready-to-eat foods. J Food Protect 66: 559–569.
    [87] Seeliger HPR, Jones D (1986) Genus Listeria. In: Sneath, P. H. A., N. S. Mair, M. E. Sharpe, J. G. Holt (eds.). Bergey’s Manual of Systematic Bacteriology Vol. 2. Williams and Wilkins, Baltimore, USA. p. 1235–1245.
    [88] Bille J, Catimel B, Bannerman E, et al. (1992) API Listeria, a new and promising one-day system to identify Listeria isolates. Appl Environ Microbiol 58: 1857–1860
    [89] Valimaa AL, Tilsala-Timisjarvi A, Virtanen E (2015) Rapid detection and identification methods for Listeria monocytogenes in the food chain—A review. Food Control 55: 103–114 doi: 10.1016/j.foodcont.2015.02.037
    [90] Huang YT, Ko WC, Chan YJ, et al. (2015) Disease Burden of Invasive Listeriosis and Molecular Characterization of Clinical Isolates in Taiwan, 2000–2013. PLoS ONE 10: p.e0141241.
    [91] Chenal-Francisque V, Lopez J, Cantinelli T, et al. (2011) Worldwide distribution of major clones of Listeria monocytogenes. Emerg Infect Dis 17: 1110–1112.
    [92] EFSA Biohaz Panel (2014)EFSA Panelon Biological Hazards. Scientific opinion on the evaluation of molecular typing methods for major food-borne microbiological hazards and their use for attribution modelling, outbreak investigation and scanning surveillance: part 2 (surveillance and data management activities). EFSA J 12: 3784.
    [93] Pauletto M, Carraro L, Babbucci M, et al. (2016) Extending RAD tag analysis to microbial ecology: a comparison between MultiLocus Sequence Typing and 2b-RAD to investigate Listeria monocytogenes genetic structure. Mol Ecol Resour 16: 823–835.
    [94] Haase JK, Didelot X, Lecuit M, et al. (2014) The ubiquitous nature of Listeria monocytogenes clones: a large-scale Multilocus Sequence Typing study. Environ Microbiol 16: 405–416. doi: 10.1111/1462-2920.12342
    [95] Nightingale KK, Windham K, Martin KE, et al. (2005) Select Listeria monocytogenes subtypes commonly found in foods carry distinct nonsense mutations in inlA leading to expression of truncated and secreted internalin A and are associated with a reduced invasion phenotype for human intestinal epithelial cells. Appl Environ Microbiol 71: 8764–8772. doi: 10.1128/AEM.71.12.8764-8772.2005
    [96] Van Stelten A, Simpson JM, Ward TJ, et al. (2010) Revelation by single-nucleotide polymorphism genotyping that mutations leading to a premature stop codon in inlA are common among Listeria monocytogenes isolates from ready-to-eat foods but not human listeriosis cases. Appl Environ Microbiol 76: 2783–2790. doi: 10.1128/AEM.02651-09
    [97] Ward TJ, Evans P, Wiedmann M, et al. (2010) Molecular and phenotypic characterization of Listeria monocytogenes from US Department of Agriculture Food Safety and Inspection Service surveillance of ready-to-eat foods and processing facilities. J Food Protect 73: 861–869.
    [98] Lecuit M, Ohayon H, Braun L, et al. (1997) Internalin of Listeria monocytogenes with an intact leucine-rich repeat region is sufficient to promote internalization. Infect Immun 65: 5309–5319.
    [99] Loman NJ, Constantinidou C, Chan JZ, et al. (2012) High-throughput bacterial genome sequencing: an embarrassment of choice, a world of opportunity. Nat Rev Microbiol 10: 599–606.
    [100] CDC (2015) Center for Disease Control and Prevention. Available from: http: //www.cdc.gov/Listeria/pdf/whole-genome-sequencing-and-Listeria-508c.pdf.
    [101] FDA/FSIS (2003) Available from: ftp: //ftp.fao.org/docrep/fao/010/y5394e/y5394e.pdf.
    [102] Giaouris E, Heir E, Desvaux M, et al. (2015) Intra-and inter-species interactions within biofilms of important foodborne bacterial pathogens. Front Microbiol 6: 841.
    [103] Dzeciol M, Schornsteiner E, Muhterem-Uyar M, et al. (2016) Bacterial diversity of floor drain biofilms and drain waters in a Listeria monocytogenes contaminated food processing environment. Intl J Food Microbiol 223: 33–40 doi: 10.1016/j.ijfoodmicro.2016.02.004
    [104] Sasahara K C, Zottola EA (1993) Biofilm formation by Listeria monocytogenes utilizes a primary colonizing microorganism in flowing system. J. Food Prot 56: 1022–1028.
    [105] Buchanan RL, Bagi LK (1999) Microbial competition: effect of Psueodomonas fluorescens on the growth of Listeria monocytogenes. Food Microbiol 16: 523–529. doi: 10.1006/fmic.1998.0264
    [106] Bremer P J, Monk I, Osborne CM (2001) Survival of Listeria monocytogenes attached to stainless steel surfaces in the presence or absence of Flavobacterium spp. J Food Prot 64, 1369–1376.
    [107] Leriche V, Carpentier B (2000) Limitation of adhesion and growth of Listeria monocytogenes on stainless steel surfaces by Staphylococcus sciuri biofilms. J Appl Microbiol 88: 594–605.
    [108] Norwood DE, Gilmour A (2001) The differential adherence capabilities of two Listeria monocytogenes strains in monoculture and multispecies biofilms as a function of temperature. Lett Appl Microbiol 33: 320–324. doi: 10.1046/j.1472-765X.2001.01004.x
    [109] Wang JI, Ray AJ, Hammons SR, et al. (2015) Persistent and transient Listeria monocytogenes strains from retail deli environments vary in their ability to adhere and form biofilms and rarely have inlA premature stop codons. Foodborne Pathog Dis 12: 151–158. doi: 10.1089/fpd.2014.1837
    [110] FST (2016) Food Safety Tech eNewsletter. Innovative Publishing Company, USA. Available from: www.foodsafetytech.com.
    [111] Chmielewski R, Frank JF (2003) Biofilm formation and control in food processing facilities. Comp Rev Food Sci 2: 22–32. doi: 10.1111/j.1541-4337.2003.tb00012.x
    [112] USDA/FSIS (2014) Compliance Guideline: Controlling Listeria monocytogenes in Post-lethality Exposed Ready-to -Eat Meat and Poultry Products. Available from: http: //www.fsis.usda.gov/wps/wcm/connect/d3373299-50e6-47d6a577e74a1e549fde/Controlling-Lm-RTE-Guideline.pdf?MOD=AJPERES
    [113] Paparella A, Serio A, Chaves-López C, et al. (2013) Plant-based intervention strategies for Listeria monocytogenes control in foods. Microbial pathogens and strategies for combating them: Science, technology and education, 2, pp.1230–1246.
    [114] Koutchma T (2008) UV light for processing foods. Ozone: Science and Engineering 30: 93–98. doi: 10.1080/01919510701816346
    [115] Ganan M, Hierro E, Hospital XF, et al. (2013) Use of pulsed light to increase the safety of ready-to-eat cured meat products. Food Control 32: 512–517. doi: 10.1016/j.foodcont.2013.01.022
    [116] Huq T, Vu KD, Riedl B, et al. (2015) Synergistic effect of gamma (γ)-irradiation and microencapsulated antimicrobials against Listeria monocytogenes on ready-to-eat (RTE) meat. Food Microbiol 46: 507–514. doi: 10.1016/j.fm.2014.09.013
    [117] Kudra LL, Sebranek JG, Dickson JS, et al. (2012) Control of Listeria monocytogenes on Frankfurters and Cooked Pork Chops by Irradiation Combined with Modified Atmosphere Packaging. J Food Protect 75: 1063–1070. doi: 10.4315/0362-028X.JFP-11-528
    [118] Jin T, Liu L, Sommers CH, et al. (2009) Radiation sensitization and postirradiation proliferation of Listeria monocytogenes on ready-to-eat deli meat in the presence of pectin-nisin films. J Food Protect 72: 644–649.
    [119] Rajkovic A, Tomasevic I, Smigic N, et al. (2010) Pulsed UV light as an intervention strategy against Listeria monocytogenes and Escherichia coli O157: H7 on the surface of a meat slicing knife. J Food Eng 100: 446–451. doi: 10.1016/j.jfoodeng.2010.04.029
    [120] Myers K, Cannon J, Montoya D, et al. (2013) Effects of high hydrostatic pressure and varying concentrations of sodium nitrite from traditional and vegetable-based sources on the growth of Listeria monocytogenes on ready-to-eat (RTE) sliced ham. Meat Sci 94: 69–76. doi: 10.1016/j.meatsci.2012.12.019
    [121] Tomasula PM, Renye JA, Van Hekken DL, et al. (2014) Effect of high-pressure processing on reduction of Listeria monocytogenes in packaged Queso Fresco. J Dairy Sci 97: 1281–1295. doi: 10.3168/jds.2013-7538
    [122] Malley TJ, Butts J, Wiedmann M (2015) Seek and destroy process: Listeria monocytogenes process controls in the ready-to-eat meat and poultry industry. J Food Protect 78: 436–445. doi: 10.4315/0362-028X.JFP-13-507
    [123] FDA (2008) Guidance for Industry: Control of Listeria monocytogenes in Refrigerated or Frozen Ready-To-Eat Foods; Draft Guidance. US Food and Drug Administration. Available from: www.fda.gov/Food/GuidanceRegulation/GuidanceDocumentsRegulatoryInformation/ FoodProcessingHACCP/ucm073110.htm.
    [124] Fabrizio KA, Cutter CN (2005) Application of electrolyzed oxidizing water to reduce Listeria monocytogenes on ready-to-eat meats. Meat Sci 71: 327–333. doi: 10.1016/j.meatsci.2005.04.012
    [125] Saini JK, Barrios MA, Marsden JL, et al. (2013) Efficacy of antimicrobial lauric arginate against Listeria monocytogenes on stainless steel coupons. Adv Microbiol 3: 29119.
    [126] Burt S (2014) Essential oils: their antibacterial properties and potential applications in foods – a review. Intl J Food Microbiol 94: 223–253.
    [127] Lv F, Liang H, Yuan Q, et al. (2011) In vitro antimicrobial effects and mechanism of action of selected plant essential oil combinations against four food-related microorganisms. Food Res Int 44: 3057–3064. doi: 10.1016/j.foodres.2011.07.030
    [128] Dhayakaran R, Neethirajan S, Weng X, et al. (2016) Investigation of the antimicrobial activity of soy peptides by developing a high throughput drug screening assay. Biochem Biophys Rep 6: 149–157.
    [129] Lui W, Hansen N (1990) Some chemical and physical properties of nisin, a small-protein antibiotic produced by Lactococcus lactis. Appl Environ Microbiol 56: 2551–2558.
    [130] Zhou H, Fang J, Tian Y, et al. (2014) Mechanisms of nisin resistance in Gram-positive bacteria. Ann Microbiol 64: 413–420. doi: 10.1007/s13213-013-0679-9
    [131] Chen X, Zhang X, Meng R, et al. (2016) Efficacy of a combination of nisin and p-Anisaldehyde against Listeria monocytogenes. Food Control 66: 100–106. doi: 10.1016/j.foodcont.2016.01.025
    [132] Campos CA, Castro MP, Gliemmo MF, et al. (2011). Use of natural antimicrobials for the control of Listeria monocytogenes in foods. Science against microbial pathogens: Communicating current research and technological advances. Formatex, Badajoz, pp.1112–1123.
    [133] Murphy RY, Hanson RE, Johnson NR, et al. (2006) Combining organic acid treatment with steam pasteurization to eliminate Listeria monocytogenes on fully cooked frankfurters. J Food Protect 69: 47–52.
    [134] Trinetta V, Floros JD, Cutter CN (2010) Sakacin A- containing pullulan film: an active packaging system to control epidemic clones of Listeria monocytogenes in ready-to-eat foods. J Food Safety 30: 366–381. doi: 10.1111/j.1745-4565.2010.00213.x
  • This article has been cited by:

    1. Qihui Zhang, Wenfen Liu, Kang Yang, Xuexian Hu, Ying Mei, 2020, Chapter 30, 978-3-030-42920-1, 499, 10.1007/978-3-030-42921-8_30
    2. Yousheng Zhou, Yang Luo, Mohammad S. Obaidat, P. Vijayakumar, Xiaojun Wang, 2021, PAMI-Anonymous Password Authentication Protocol for Medical Internet of Things, 978-1-7281-8104-2, 1, 10.1109/GLOBECOM46510.2021.9685900
    3. Yongli Tang, Ying Li, Zongqu Zhao, Jing Zhang, Lina Ren, Yuanhong Li, Zhe-Li Liu, Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices , 2021, 2021, 1939-0122, 1, 10.1155/2021/6952869
    4. Preecha Yupapin, Chandrashekhar Meshram, Sharad Kumar Barve, Rabha W. Ibrahim, Muhammad Azeem Akbar, An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems, 2023, 1432-7643, 10.1007/s00500-023-07889-4
  • Reader Comments
  • © 2016 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(9269) PDF downloads(1724) Cited by(18)

Figures and Tables

Tables(3)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog