ESO 发表于 2025-3-28 18:12:55

Public Key Encryption with Authorized Keyword Searchconsiderably. This property makes our PEAKS quite useful when the authorized token needs to be frequently updated with time for security purpose. The semantical security against chosen keyword attack and trapdoor unforgeability are formally proved.

湿润 发表于 2025-3-28 22:24:48

http://reply.papertrans.cn/47/4655/465421/465421_42.png

bifurcate 发表于 2025-3-28 23:09:41

http://reply.papertrans.cn/47/4655/465421/465421_43.png

无弹性 发表于 2025-3-29 03:13:17

Proxy Signature with Revocation his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we investigate the problem of proxy signature with revocation. The revocation of delegated signing right is necessary for a proxy signature scheme when

我们的面粉 发表于 2025-3-29 10:28:08

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structuigher classes can be employed to derive the keys of classes lower down in the hierarchy. A hierarchical key assignment scheme for . allows to make dynamic updates to the hierarchy, such as addition, deletion and modification of classes and relations among them, as well as the revocation of users..In

范例 发表于 2025-3-29 14:27:12

Content-Based Encryptionen network. Unlike the TCP/IP network topology, which is address-driven, content-centric networks do not require any address. Based on the content-to-consumer paradigm, content-centric networking architecture was proposed for the content to be provided efficiently with great convenience to users. As

faucet 发表于 2025-3-29 18:32:26

Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometrytext. It is a useful building block in cryptology to distribute the trust of the secret key as well as increase availability. In particular, threshold Paillier encryption has been widely used in various security protocols, such as e-auction, e-voting and e-lottery. In this paper, we present the idea

antecedence 发表于 2025-3-29 20:30:23

http://reply.papertrans.cn/47/4655/465421/465421_48.png

Itinerant 发表于 2025-3-30 01:33:23

http://reply.papertrans.cn/47/4655/465421/465421_49.png

坚毅 发表于 2025-3-30 04:51:23

Proxy Re-encryption with Delegatable Verifiability a result, proxy re-encryption has increased utility, and can be used in a number of fields including cloud computing. In previous proxy re-encryption schemes, a proxy is assumed to follow the protocol explicitly. However, this is far from the norm, and the assumption is not always true, especially
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security and Privacy; 21st Australasian Co Joseph K. Liu,Ron Steinfeld Conference proceedings 2016 Springer International Publi