Results 41 to 50 of about 80,521 (269)
Idealizing Identity-Based Encryption [PDF]
We formalize the standard application of identity-based encryption IBE, namely non-interactive secure communication, as realizing an ideal system which we call delivery controlled channel DCC. This system allows users to be registered by a central authority for an identity and to send messages securely to other users only known by their identity ...
Hofheinz, Dennis +2 more
openaire +2 more sources
Body language, security and e-commerce [PDF]
Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices.
Desmarais, Norman
core +2 more sources
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a ...
Ling, San +3 more
core +1 more source
Security and Privacy Issues of Big Data [PDF]
This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy.
Moura, Jose, Serrao, Carlos
core +2 more sources
Secure and {\sl Practical} Identity-Based Encryption [PDF]
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In
Naccache, David
core +1 more source
ABSTRACT Arteriovenous malformations (AVMs) are rare, high‐flow, vascular anomalies that can occur either sporadically or as part of a genetic syndrome. AVMs can progress with serious morbidity and even mortality if left unchecked. Sirolimus is an mTOR inhibitor that is effective in low‐flow vascular malformations; however, its role in AVMs is unclear.
Will Swansson +3 more
wiley +1 more source
Efficient Identity-based Encryption Scheme over Ideal Lattice [PDF]
Recently,Identity-based Encryption(IBE) scheme based on lattices becomes one of the focuses of cryptographic research.But the IBE scheme based on standard lattice have large key size and high ciphertext expansion rate.So based on ideal lattices,this ...
WEI Lihao,AI Jieqing,LIU Shenghan
doaj +1 more source
Mapping the evolution of mitochondrial complex I through structural variation
Respiratory complex I (CI) is crucial for bioenergetic metabolism in many prokaryotes and eukaryotes. It is composed of a conserved set of core subunits and additional accessory subunits that vary depending on the organism. Here, we categorize CI subunits from available structures to map the evolution of CI across eukaryotes. Respiratory complex I (CI)
Dong‐Woo Shin +2 more
wiley +1 more source
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Searchable encryption is a cryptographic primitive that supports users to search for keywords on ciphertext.In view of the low efficiency of traditional single-server searchable encryption schemes,it was based on the advantages of identity management in ...
Yanhua LU, Youliang TIAN, Chen LIU
doaj +2 more sources
An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public keys. However, how to dynamically revoke users in an IBE scheme is not a trivial problem.
Ziyuan Hu +3 more
doaj +1 more source

