Results 31 to 40 of about 80,415 (263)
Efficient Anonymous Authentication for Wireless Body Area Networks
Advances in integrated circuit and wireless communication technologies are making wireless body area networks (WBANs) an increasingly important medical paradigm. By collecting, uploading, and processing real-time physical parameters, WBANs assist clients
Chuang Li, Chunxiang Xu
doaj +1 more source
On Forward-Secure Storage [PDF]
We study a problem of secure data storage in a recently introduced Limited Communication Model. We propose a new cryptographic primitive that we call a Forward-Secure Storage (FSS). This primitive is a special kind of an encryption scheme, which produces huge (5 GB, say) ciphertexts, even from small plaintexts, and has the following non-standard ...
openaire +1 more source
Novel construction of forward-secure public-key encryption in the standard model
All existing provably secure forward-secure public-key encryption schemes in the literature were only proven to be chosen-plaintext secure. A novel forward-secure public-key encryption scheme without random oracles was pro-posed.
Yang LU, Ji-guo LI
doaj +2 more sources
Forward-Secure Public-Key Encryption Scheme Based on SM9 [PDF]
In the traditional hybrid cryptosystem, an attacker can generate the previously used session key to decrypt session contents encrypted under the session key due to the leakage of the current private key.
HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei
doaj +1 more source
Forward-Secure Edge Authentication for Graphs
AbstractThe edge authentication of graphs has been studied in the literature because graphs are one of the most widely used data organization structures. The majority of such schemes cannot be used to authenticate general directed graphs (GDGs); other schemes cannot be used for addressing either the issue of dynamic update or the issue of information ...
Fei Zhu +5 more
openaire +1 more source
Time after time – circadian clocks through the lens of oscillator theory
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo +2 more
wiley +1 more source
HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme
The schemes submitted to NIST call for standardization of post-quantum cryptography have some common drawbacks in terms of decryption failure probability, scalability, and switching issues from pre-quantum to post- quantum cryptography. In this paper, we
Simran Choudhary, Anil Gupta
doaj +1 more source
Forward Secure Ring Signature without Random Oracles [PDF]
In this paper, we propose a forward secure ring signature scheme without random oracles. With forward security, if a secret key of a corresponding ring member is exposed, all previously signed signatures containing this member remain valid. Yet the one who has stolen the secret key cannot produce any valid signature belonged to the past time period ...
Yuen, TH, Liu, JK, Zhou, J
openaire +2 more sources
The Ile181Asn variant of human UDP‐xylose synthase (hUXS1), associated with a short‐stature genetic syndrome, has previously been reported as inactive. Our findings demonstrate that Ile181Asn‐hUXS1 retains catalytic activity similar to the wild‐type but exhibits reduced stability, a looser oligomeric state, and an increased tendency to precipitate ...
Tuo Li +2 more
wiley +1 more source
Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme
Aiming at reducing the local storage burden and computational costs, numerous individuals and enterprises are willing to outsource their data to the cloud server.
Haifeng Li +4 more
doaj +1 more source

