Results 41 to 50 of about 26,946 (315)
Certificateless public key cryptography based provable data possession scheme in edge environment
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj +2 more sources
New provable data transfer from provable data possession and deletion for secure cloud storage
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu +3 more
doaj +1 more source
Provably Secure Metering Scheme [PDF]
Naor and Pinkas introduced metering schemes at Eurocrypt '98 in order to decide on advertisement fees for web servers. In the schemes, any server should be able to construct a proof to be sent to an audit agency if and only if it has been visited by at least a certain number, say k, of clients.
Wakaha Ogata, Kaoru Kurosawa
openaire +2 more sources
Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI +3 more
doaj +2 more sources
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications
Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many academic SE schemes show provable security, they usually expose some query information (e.g., search and access patterns) to achieve high ...
Guofeng Wang +5 more
doaj +1 more source
Provably Secure Covert Communication on Blockchain [PDF]
Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing number of related applications, such as smart contracts. The open nature of blockchain together with strong integrity guarantees on the stored data makes it a compelling platform for covert ...
openaire +3 more sources
Practical Fault-Tolerant Data Aggregation
During Financial Cryptography 2012 Chan et al. presented a novel privacy-protection fault-tolerant data aggregation protocol. Comparing to previous work, their scheme guaranteed provable privacy of individuals and could work even if some number of users ...
Grining, Krzysztof +2 more
core +1 more source
A Synergistic Complexation‐Encapsulation Paradigm Enables Unprecedented Radioactive Remediation
A novel HDEHP‐APG eutectic mixture‐based detergent is developed that achieves highly efficient decontamination of Am through a synergistic complexation‐encapsulation mechanism. Remarkably, such a detergent effectively removes radionuclides across a wide range of oxidation states (+I to +VII), demonstrating exceptional versatility.
Qilong Tang +4 more
wiley +1 more source
Security of COFB against Chosen Ciphertext Attacks
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project.
Mustafa Khairallah
doaj +1 more source
Efficient and provable security amplifications [PDF]
Even, Goldreich and Micali showed at Crypto''89 that the existence of signature schemes secure against known message attacks implies the existence of schemes secure against adaptively chosen message attacks. Unfortunately, this transformation leads to a rather impractical scheme. We exhibit a similar security amplification, which takes the given scheme
Torben P. Pedersen +8 more
openaire +2 more sources

