找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Privacy; 21st Australasian Co Joseph K. Liu,Ron Steinfeld Conference proceedings 2016 Springer International Publi

[复制链接]
楼主: IU421
发表于 2025-3-28 18:12:55 | 显示全部楼层
Public Key Encryption with Authorized Keyword Searchconsiderably. This property makes our PEAKS quite useful when the authorized token needs to be frequently updated with time for security purpose. The semantical security against chosen keyword attack and trapdoor unforgeability are formally proved.
发表于 2025-3-28 22:24:48 | 显示全部楼层
发表于 2025-3-28 23:09:41 | 显示全部楼层
发表于 2025-3-29 03:13:17 | 显示全部楼层
Proxy Signature with Revocation his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we investigate the problem of proxy signature with revocation. The revocation of delegated signing right is necessary for a proxy signature scheme when
发表于 2025-3-29 10:28:08 | 显示全部楼层
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structuigher classes can be employed to derive the keys of classes lower down in the hierarchy. A hierarchical key assignment scheme for . allows to make dynamic updates to the hierarchy, such as addition, deletion and modification of classes and relations among them, as well as the revocation of users..In
发表于 2025-3-29 14:27:12 | 显示全部楼层
Content-Based Encryptionen network. Unlike the TCP/IP network topology, which is address-driven, content-centric networks do not require any address. Based on the content-to-consumer paradigm, content-centric networking architecture was proposed for the content to be provided efficiently with great convenience to users. As
发表于 2025-3-29 18:32:26 | 显示全部楼层
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometrytext. It is a useful building block in cryptology to distribute the trust of the secret key as well as increase availability. In particular, threshold Paillier encryption has been widely used in various security protocols, such as e-auction, e-voting and e-lottery. In this paper, we present the idea
发表于 2025-3-29 20:30:23 | 显示全部楼层
发表于 2025-3-30 01:33:23 | 显示全部楼层
发表于 2025-3-30 04:51:23 | 显示全部楼层
Proxy Re-encryption with Delegatable Verifiability a result, proxy re-encryption has increased utility, and can be used in a number of fields including cloud computing. In previous proxy re-encryption schemes, a proxy is assumed to follow the protocol explicitly. However, this is far from the norm, and the assumption is not always true, especially
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-6 11:54
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表