Results 31 to 40 of about 81,733 (278)

On Forward-Secure Storage [PDF]

open access: yes, 2006
We study a problem of secure data storage in a recently introduced Limited Communication Model. We propose a new cryptographic primitive that we call a Forward-Secure Storage (FSS). This primitive is a special kind of an encryption scheme, which produces huge (5 GB, say) ciphertexts, even from small plaintexts, and has the following non-standard ...
openaire   +1 more source

A Secure Traitor Tracing Scheme against Key Exposure

open access: yes, 2005
Copyright protection is a major issue in distributing digital content. On the other hand, improvements to usability are sought by content users. In this paper, we propose a secure {\it traitor tracing scheme against key exposure (TTaKE)} which contains ...
Hanaoka, Goichiro   +2 more
core   +2 more sources

QuickSync: A Quickly Synchronizing PoS-Based Blockchain Protocol

open access: yes, 2021
To implement a blockchain, we need a blockchain protocol for all the nodes to follow. To design a blockchain protocol, we need a block publisher selection mechanism and a chain selection rule.
Gujar, Sujit, Siddiqui, Shoeb
core  

Novel construction of forward-secure public-key encryption in the standard model

open access: yesTongxin xuebao, 2014
All existing provably secure forward-secure public-key encryption schemes in the literature were only proven to be chosen-plaintext secure. A novel forward-secure public-key encryption scheme without random oracles was pro-posed.
Yang LU, Ji-guo LI
doaj   +2 more sources

Forward-Secure Public-Key Encryption Scheme Based on SM9 [PDF]

open access: yesJisuanji kexue yu tansuo
In the traditional hybrid cryptosystem, an attacker can generate the previously used session key to decrypt session contents encrypted under the session key due to the leakage of the current private key.
HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei
doaj   +1 more source

Forward-Secure Edge Authentication for Graphs

open access: yesThe Computer Journal, 2021
AbstractThe edge authentication of graphs has been studied in the literature because graphs are one of the most widely used data organization structures. The majority of such schemes cannot be used to authenticate general directed graphs (GDGs); other schemes cannot be used for addressing either the issue of dynamic update or the issue of information ...
Fei Zhu   +5 more
openaire   +1 more source

Effects of the Fluid Replacement Method During Online Hemodiafiltration on the Solute Removal Performance and Biocompatibility Using the Asymmetric Cellulose Triacetate Membrane

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Pre‐dilution online hemodiafiltration (Pre‐HDF) is predominantly used in Japan, whereas post‐dilution online HDF (Post‐HDF) is more common in Europe. An asymmetric cellulose triacetate (ATA) membrane may improve biocompatibility.
Kenji Sakurai   +4 more
wiley   +1 more source

HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme

open access: yesEngineering Science and Technology, an International Journal, 2022
The schemes submitted to NIST call for standardization of post-quantum cryptography have some common drawbacks in terms of decryption failure probability, scalability, and switching issues from pre-quantum to post- quantum cryptography. In this paper, we
Simran Choudhary, Anil Gupta
doaj   +1 more source

Forward Secure Ring Signature without Random Oracles [PDF]

open access: yes, 2011
In this paper, we propose a forward secure ring signature scheme without random oracles. With forward security, if a secret key of a corresponding ring member is exposed, all previously signed signatures containing this member remain valid. Yet the one who has stolen the secret key cannot produce any valid signature belonged to the past time period ...
Yuen, TH, Liu, JK, Zhou, J
openaire   +2 more sources

A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data

open access: yes, 2018
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy