Results 31 to 40 of about 278,857 (261)

Hash function requirements for Schnorr signatures

open access: yesJournal of Mathematical Cryptology, 2009
We provide two necessary conditions on hash functions for the Schnorr signature scheme to be secure, assuming compact group representations such as those which occur in elliptic curve groups. We also show, via an argument in the generic group model, that
Neven Gregory   +2 more
doaj   +1 more source

Convertible Group Undeniable Signatures [PDF]

open access: yes, 2003
Group undeniable signatures are like ordinary group signatures except that verifying signatures needs the help of the group manager. In this paper, we propose a convertible group undeniable signature scheme in which the group manager can turn all or selective signatures, which are originally group undeniable signatures, into ordinary group signatures ...
Lyuu, Yuh-Dauh, Wu, Ming-Luen
openaire   +1 more source

Foundations of Fully Dynamic Group Signatures [PDF]

open access: yesJournal of Cryptology, 2016
AbstractGroup signatures allow members of a group to anonymously sign on behalf of the group. Membership is administered by a designated group manager. The group manager can also reveal the identity of a signer if and when needed to enforce accountability and deter abuse.
Bootle J   +4 more
openaire   +5 more sources

Adjunctive Therapeutic Plasma Exchange in Refractory Adult‐Onset Still's Disease Complicated by Secondary Macrophage Activation Syndrome: A Single‐Center Experience

open access: yesTherapeutic Apheresis and Dialysis, EarlyView.
ABSTRACT Introduction Adult‐onset Still's disease (AOSD) complicated by macrophage activation syndrome (MAS) carries substantial mortality. The role of therapeutic plasma exchange (TPE) remains uncertain. Methods We retrospectively analyzed patients with AOSD‐MAS treated with TPE at a single‐center.
Masataka Ueda   +15 more
wiley   +1 more source

Identification and Validation of Inflammatory Response-Related Gene Signatures to Predict the Prognosis of Neuroblastoma

open access: yesInternational Journal of Genomics, 2022
Background. Neuroblastoma (NB) is the third most common malignant tumor in children. The inflammation is believed to be closely related to NB patients’ prognosis.
Jiye Song   +6 more
doaj   +1 more source

Organoids in pediatric cancer research

open access: yesFEBS Letters, EarlyView.
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley   +1 more source

WebRTC Swarms: Decentralized, Incentivized, and Privacy-Preserving Signaling with Designated Verifier Zero-Knowledge Authentication

open access: yesFuture Internet
Real-time peer-to-peer communication in web browsers typically relies on centralized signaling servers, creating single points of failure, privacy vulnerabilities, and censorship risks.
Rafał Skowroński
doaj   +1 more source

A New Secure Encryption Scheme Based on Group Factorization Problem

open access: yesIEEE Access, 2019
As special types of factorization of finite groups, logarithmic signatures and covers have been used as the main components of cryptographic keys for secret key cryptosystems such as $PGM$ and public key cryptosystems like $MST_{1}$ , $MST_{2 ...
Yue Cong   +5 more
doaj   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Securing an Authenticated Privacy Preserving Protocol in a Group Signature Scheme Based on a Group Ring

open access: yesMathematics, 2023
Group signatures are a leading competing signature technique with a substantial amount of research. With group settings, group signatures provide user anonymity. Any group member with access to the group can generate a signature while remaining anonymous.
Nur Afiqah Suzelan Amir   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy