Results 1 to 10 of about 18,416,188 (285)

Efficient and Expressive Access Control With Revocation for Privacy of PHR Based on OBDD Access Structure

open access: yesIEEE Access, 2020
With the advancement of information and communication technology (ICT), the medical sector is undergoing a massive transformation. Health records are being digitized, stored remotely in the cloud and shared with different stakeholders.
Kennedy Edemacu   +2 more
doaj   +2 more sources

Access structures determined by uniform polymatroids

open access: yesJournal of Mathematical Cryptology, 2023
In this article, all multipartite access structures obtained from uniform integer polymatroids were investigated using the method developed by Farràs, Martí-Farré, and Padró. They are matroid ports, i.e., they satisfy the necessary condition to be ideal.
Kawa Renata, Kula Mieczysław
doaj   +3 more sources

Structure–efficiency relationship of access group antibiotics via SK chromatic descriptors [PDF]

open access: yesFrontiers in Chemistry
In graph theory, topological indices play a significant role as numerical descriptors of a graph, helping to summarize the physicochemical properties of a molecular graph.
R. Rajambigai   +2 more
doaj   +2 more sources

The Access Structure in Learner's Dictionaries*

open access: yesLexikos, 2010
: Dictionaries have to be compiled in accordance with specific target users and dictionarygoals. User orientation is, however, not the only criterion for measuring the success of adictionary.
M. Steyn
semanticscholar   +7 more sources

An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption

open access: yesJournal of Cryptology, 2023
We propose and implement a multiparty homomorphic encryption (MHE) scheme with a $$t$$ t -out-of- $$N$$ N -threshold access-structure that is efficient and does not require a trusted dealer in the common random string model. We construct this scheme from
C. Mouchet   +2 more
semanticscholar   +1 more source

Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious Majority and Free Verification [PDF]

open access: yesTheoretical Computer Science, 2020
Secret sharing allows a dealer to distribute a secret among several parties such that only authorized subsets of parties, specified by a (monotone) access structure, can reconstruct the secret.
V. Sehrawat, Foo Yee Yeo, Y. Desmedt
semanticscholar   +1 more source

Design of Memory Access Structure for Coarse-Grained Reconfigurable Array with Decoupled Access Execute [PDF]

open access: yesJisuanji gongcheng, 2021
Coarse-Grained Reconfigurable Array(CGRA) architecture has both flexibility and efficiency,but its characteristics of high computing throughput also brings pressure to memory.In the case of the relative fixed bandwidth of off-chip Dynamic Random Access ...
HONG Tu, JING Naifeng
doaj   +1 more source

The accessibility of an access structure [PDF]

open access: yesRAIRO - Theoretical Informatics and Applications, 2006
Summary: In secret sharing, different access structures have different difficulty degrees for acceding to the secret. We give a numerical measure of how easy or how difficult is to recover the secret, depending only on the structure itself and not on the particular scheme used for realizing it. We derive some consequences.
Carreras, Francesc   +2 more
openaire   +1 more source

Attribute-based encryption schema with group signatures

open access: yes网络与信息安全学报, 2019
Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data. In CP-ABE, When the users access the cipher text, the access structure and the cipher text were sent to the users.
ZHANG Xinglan, CUI Yao
doaj   +3 more sources

CP-ABE Scheme Using Selectively Hidden Tree Access Structure [PDF]

open access: yesJisuanji gongcheng, 2020
Hidden access structure is a secure operation of Ciphertext Policy Attribute Base Encryption(CP-ABE),which can effectively prevent the leakage of sensitive information.However,tree access structure used by existing CP-ABE schemes are either completely ...
HAN Shuyan, Nurmamat Helil
doaj   +1 more source

Home - About - Disclaimer - Privacy