Results 31 to 40 of about 30,753 (229)

Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography

open access: yesIEEE Access, 2022
Blind signature is a special digital signature that allows the signer to sign a document without knowing its content. However, in many situations, multiple people need to blindly sign messages.
Rui Ma, Linyue Du
doaj   +1 more source

Duality between quantum symmetric algebras [PDF]

open access: yes, 2006
Using certain pairings of couples, we obtain a large class of two-sided non-degenerated graded Hopf pairings for quantum symmetric algebras.Comment: 15 pages. Letters in Math.
C. Cibils   +13 more
core   +2 more sources

Pairing-based identification schemes [PDF]

open access: yes, 2005
We propose four different identification schemes that make use of bilinear pairings, and prove their security under certain computational assumptions. Each of the schemes is more efficient and/or more secure than any known pairing-based identification ...
Freeman, David
core   +2 more sources

On $5$-manifolds with free fundamental group and simple boundary links in $S^5$

open access: yes, 2017
We classify compact oriented $5$-manifolds with free fundamental group and $\pi_{2}$ a torsion free abelian group in terms of the second homotopy group considered as $\pi_1$-module, the cup product on the second cohomology of the universal covering, and ...
Kreck, Matthias, Su, Yang
core   +1 more source

Study of a Novel Bi‐Layered Thermoplastic Polyurethane Patch for Congenital Diaphragmatic Hernia

open access: yesAdvanced Materials Interfaces, EarlyView.
Large congenital diaphragmatic hernia remains a challenge due to the poor compatibility of current prostheses. To tackle this problem, a bilayer thermoplastic polyurethane patch with tunable mechanical properties is engineered, whose fibrous side supports rapid fibroblast and myoblast colonization, while the smooth film limits adhesions.
Guillaume Leks   +14 more
wiley   +1 more source

Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism

open access: yesTongxin xuebao, 2023
The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation ...
Kuan LIU   +4 more
doaj   +2 more sources

Loop Currents and Anomalous Hall Effect from Time-Reversal Symmetry-Breaking Superconductivity on the Honeycomb Lattice

open access: yesPhysical Review X, 2019
We study a tight-binding model on the honeycomb lattice of chiral d-wave superconductivity that breaks time-reversal symmetry. Because of its nontrivial sublattice structure, we show that it is possible to construct a gauge-invariant time-reversal-odd ...
P. M. R. Brydon   +3 more
doaj   +1 more source

Homogeneous projective bundles over abelian varieties

open access: yes, 2013
We consider those projective bundles (or Brauer-Severi varieties) over an abelian variety that are homogeneous, i.e., invariant under translation. We describe the structure of these bundles in terms of projective representations of commutative algebraic ...
Berkovich   +7 more
core   +1 more source

A Multidirectional Textile Interface for Remote Control Using Dynamic Area‐Based Capacitance Modulation

open access: yesAdvanced Robotics Research, EarlyView.
Here, we present a textile, wearable capacitive interface enabling multidirectional remote control by dynamically modulating electrode overlap and spacing via a freely gliding upper electrode. A forearm‐mounted prototype drives robotic and media tasks with 12–15 ms latency, maintains < 0.8% drift after 500 cycles, and remains stably functional at 90 ...
Cagatay Gumus   +8 more
wiley   +1 more source

Research of STR multicast key management protocol based on bilinear pairing in ad hoc network

open access: yesTongxin xuebao, 2008
STR multicast key management protocol has an optimal cost in computation,communication and storage.But on security property,STR cannot resist active attacks without providing key authentication.By introducing the bilinear pairing cryptosystem and the 3 ...
ZHOU Fu-cai1   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy