Results 21 to 30 of about 975,907 (284)

Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]

open access: yes, 2011
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core   +5 more sources

Diverging Tests of Equal Predictive Ability [PDF]

open access: yesEconometrica, 2020
We investigate claims made in Giacomini and White (2006) and Diebold (2015) regarding the asymptotic normality of a test of equal predictive ability. A counterexample is provided in which, instead, the test statistic diverges with probability 1 under the null.
openaire   +2 more sources

Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles

open access: yesIEEE Access, 2019
The fast progression of the Internet of Vehicles (IoV) has resulted in a large number of vehicles connecting to networks. This leads to massive growth in the data collected from vehicles via IoV.
Rashad Elhabob   +3 more
doaj   +1 more source

A Multivariate Public Key Encryption Scheme With Equality Test

open access: yesIEEE Access, 2020
The public key encryption with equality test (PKEET) allows the cloud server to judge whether two different ciphertexts are generated by the same message without decryption. Through this technique, PKEET provides an effective solution for building secure
Xiaoying Shen   +3 more
doaj   +1 more source

Identity-Based Encryption with Equality Test Scheme Supporting Flexible Authorization [PDF]

open access: yesJisuanji gongcheng, 2019
The Identity-Based Encryption with Equality Test(IBEET) scheme can simplify the management of keys and certificates while ensuring data confidentiality,but it lacks control over the granularity of authorization,making it difficult to meet the management ...
ZHANG Qi, LI Jiawei, LIN Xijun, QU Haipeng
doaj   +1 more source

A Computational Approach Test for the Equality of Two Multivariate Normal Mean Vectors under Heterogeneity of Covariance Matrices

open access: yesRevstat Statistical Journal, 2022
In this paper, a computational approach test (CAT) was proposed to test the equality of two multivariate normal mean vectors under heterogeneity of covariance matrices.
Esra Gökpınar   +4 more
doaj   +1 more source

Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement

open access: yesIEEE Access, 2019
Privacy-presenting for cloud computing has been concerned for several years. Public key encryption with equality test as a variant of keyword searchable encryption is one of the important concepts in this area.
Yongjian Liao   +4 more
doaj   +1 more source

An equality test across nonparametric regressions [PDF]

open access: yesJournal of Econometrics, 2001
Une procédure pour tester l'égalité d'une régression non paramétrique entre différents groupes est proposée. La procédure autorise des régresseurs multidimensionnels et un nombre quelconque de groupes. On considère des variables explicatives aléatoires et on envisage le cas où les valeurs de ces variables et le nombre d'observations diffèrent suivant ...
openaire   +7 more sources

oTree: The Equality Equivalence Test [PDF]

open access: yesJournal of Behavioral and Experimental Finance, 2019
Based on a small set of assumptions on preferences, Kerschbamer (2015) introduces a geometric delineation of distributional preferences and a parsimonious, non-parametric identification procedure - the Equality Equivalence Test (EET). The assumptions of the test result in a mutually exclusive taxonomy of social preference archetypes, nesting all ...
Holzmeister, Felix, Kerschbamer, Rudolf
openaire   +2 more sources

Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups

open access: yesIEEE Access, 2019
Due to the massive growth of data and security concerns, data of patients would be encrypted and outsourced to the cloud server for feature matching in various medical scenarios, such as personal health record systems, actuarial judgments and diagnostic ...
Yuanhao Wang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy