Results 41 to 50 of about 26,946 (315)

Certificateless public key cryptography based provable data possession scheme in edge environment

open access: yesTongxin xuebao, 2022
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the ...
Ziyuan WANG, Ruizhong DU
doaj   +2 more sources

New provable data transfer from provable data possession and deletion for secure cloud storage

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation.
Yudong Liu   +3 more
doaj   +1 more source

Provably Secure Metering Scheme [PDF]

open access: yes, 2000
Naor and Pinkas introduced metering schemes at Eurocrypt '98 in order to decide on advertisement fees for web servers. In the schemes, any server should be able to construct a proof to be sent to an audit agency if and only if it has been visited by at least a certain number, say k, of clients.
Wakaha Ogata, Kaoru Kurosawa
openaire   +2 more sources

Provable data possession scheme with authentication

open access: yesTongxin xuebao, 2016
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI   +3 more
doaj   +2 more sources

IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications

open access: yesIEEE Access, 2018
Searchable Encryption (SE) has been extensively examined by both academic and industry researchers. While many academic SE schemes show provable security, they usually expose some query information (e.g., search and access patterns) to achieve high ...
Guofeng Wang   +5 more
doaj   +1 more source

Provably Secure Covert Communication on Blockchain [PDF]

open access: yesCryptography, 2018
Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing number of related applications, such as smart contracts. The open nature of blockchain together with strong integrity guarantees on the stored data makes it a compelling platform for covert ...
openaire   +3 more sources

Practical Fault-Tolerant Data Aggregation

open access: yes, 2016
During Financial Cryptography 2012 Chan et al. presented a novel privacy-protection fault-tolerant data aggregation protocol. Comparing to previous work, their scheme guaranteed provable privacy of individuals and could work even if some number of users ...
Grining, Krzysztof   +2 more
core   +1 more source

A Synergistic Complexation‐Encapsulation Paradigm Enables Unprecedented Radioactive Remediation

open access: yesAdvanced Science, EarlyView.
A novel HDEHP‐APG eutectic mixture‐based detergent is developed that achieves highly efficient decontamination of Am through a synergistic complexation‐encapsulation mechanism. Remarkably, such a detergent effectively removes radionuclides across a wide range of oxidation states (+I to +VII), demonstrating exceptional versatility.
Qilong Tang   +4 more
wiley   +1 more source

Security of COFB against Chosen Ciphertext Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2022
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project.
Mustafa Khairallah
doaj   +1 more source

Efficient and provable security amplifications [PDF]

open access: yes, 1997
Even, Goldreich and Micali showed at Crypto''89 that the existence of signature schemes secure against known message attacks implies the existence of schemes secure against adaptively chosen message attacks. Unfortunately, this transformation leads to a rather impractical scheme. We exhibit a similar security amplification, which takes the given scheme
Torben P. Pedersen   +8 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy