抗原 发表于 2025-3-26 23:15:12
Information Security and Cryptology978-3-319-16745-9Series ISSN 0302-9743 Series E-ISSN 1611-3349Euthyroid 发表于 2025-3-27 01:17:45
Conference proceedings 2015 Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattExpertise 发表于 2025-3-27 08:11:08
An Efficient Privacy-Preserving E-coupon Systemtomer during the redemption process. In this paper, we present a novel e-coupon system that can achieve all these desirable properties. We define the formal security models for these new security requirements, and show that our new e-coupon system is proven secure in the proposed models.持续 发表于 2025-3-27 13:16:40
http://reply.papertrans.cn/47/4654/465355/465355_34.pngResection 发表于 2025-3-27 14:40:36
Universally Composable Identity Based Adaptive Oblivious Transfer with Access Controladversary under .-Strong Diffie-Hellman (SDH), Decision Bilinear Diffie-Hellman (DBDH), .-Decision Bilinear Diffie-Hellman Exponent (DBDHE) and Decision Linear (DLIN) assumptions. The scheme outperforms the existing similar schemes in terms of both communication and computation.宴会 发表于 2025-3-27 20:24:50
http://reply.papertrans.cn/47/4654/465355/465355_36.png轻浮女 发表于 2025-3-27 21:55:54
http://reply.papertrans.cn/47/4654/465355/465355_37.pngDUCE 发表于 2025-3-28 05:57:56
Trapdoors for Ideal Lattices with Applicationsion, we use the new trapdoor to construct a new hierarchical identity-based encryption scheme, which allows us to construct public-key encryption with chosen-ciphertext security, signatures, and public-key searchable encryption.Entirety 发表于 2025-3-28 06:20:03
http://reply.papertrans.cn/47/4654/465355/465355_39.pngatrophy 发表于 2025-3-28 11:28:11
A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBACitecture and model transformations between them. We therefore introduce a modelling language extension/ profile for defining system requirements with basic security requirement concepts. We also formalize the model transformation between this profile and a security formal verification method. We exemplify our approach on a medical case study.