clarify 发表于 2025-3-30 10:57:35

http://reply.papertrans.cn/24/2339/233866/233866_51.png

inferno 发表于 2025-3-30 12:40:45

Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacyern leakages. An access pattern leakage is utilized to achieve an ., whereas both access and search pattern leakages are exploited for the .. In this paper, we propose two novel schemes for outsourcing encrypted spatial data supporting dynamic range search. Our proposed schemes leverage R.tree to pa

使苦恼 发表于 2025-3-30 19:50:59

Efficient Multi-client Order-Revealing Encryption and Its Applications018). Further, we present a non-interactive multi-client range query scheme by extending .. Finally, we show a formal security analysis and implement our scheme. The evaluation result demonstrates that . outperforms the scheme by Cash et al. in terms of both query and storage cost while achieving th

灌输 发表于 2025-3-30 21:25:48

Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstraction has slightly different properties, but provides essentially the same functionality for applications. It makes TRE versatile and can be used beyond HTRE, for instance to construct timed-release functional encryption. Interestingly, it achieves a new . property, which supports that an arbitrary

财产 发表于 2025-3-31 01:17:53

SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environme that transfers encrypted data onto more powerful machines. Furthermore, for resource-constrained IoT devices, the requester can authenticate devices at different levels based on the type of communication. SyLPEnIoT was meticulously designed to run on a gamut of IoT devices, including ultra low-powe

星星 发表于 2025-3-31 08:26:31

Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWEg advantage of it, we then extend our single-hop AB-CPRE into an efficient and concise multi-hop one. No matter how many transformations are performed, the re-encrypted ciphertext is in constant size, and only one encryption/decryption algorithm is needed. Both of our schemes are proved to be select

核心 发表于 2025-3-31 12:12:40

Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Modelcurity for (Attribute-based) proxy re-encryption schemes: security under chosen-plaintext attacks (CPA) and security under chosen-ciphertext attacks (CCA). Both definitions aim to address the security that the delegator enjoys against both proxy and delegatee. Recently, at PKC 19, Cohen points out t

意外的成功 发表于 2025-3-31 13:48:28

Server-Aided Revocable Attribute-Based Encryption Revised: Multi-User Setting and Fully Secure.Unfortunately, current SR-ABE schemes could only be provably secure in one-user setting, which means there’s only one “target user” . with an attribute set . satisfying the access structure . in the challenge ciphertext, i.e., .. However, a more reasonable security model, i.e., multi-user setting,

Seizure 发表于 2025-3-31 17:48:07

http://reply.papertrans.cn/24/2339/233866/233866_59.png

新义 发表于 2025-3-31 23:08:43

http://reply.papertrans.cn/24/2339/233866/233866_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Computer Security – ESORICS 2021; 26th European Sympos Elisa Bertino,Haya Shulman,Michael Waidner Conference proceedings 2021 Springer Natu