Results 41 to 50 of about 19,760 (270)
Resplittable threshold multi-broker proxy re-encryption scheme from lattices
Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the ...
Ju-yan LI, Chun-guang MA, Qian ZHAO
doaj +2 more sources
Shared and Searchable Encrypted Data for Untrusted Servers [PDF]
Current security mechanisms pose a risk for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu +2 more
core +3 more sources
A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine-
Tao Feng, Dewei Wang, Renbin Gong
doaj +1 more source
Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa +4 more
core +3 more sources
Aggressive prostate cancer is associated with pericyte dysfunction
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero +11 more
wiley +1 more source
Attribute-based proxy re-encryption scheme with multiple features
A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to ...
Chaosheng FENG +4 more
doaj +2 more sources
Proxy Re-Encryption Scheme for Decentralized Storage Networks
Storage is a promising application for permission-less blockchains. Before blockchain, cloud storage was hosted by a trusted service provider. The centralized system controls the permission of the data access. In web3, users own their data.
Jia Kan, Jie Zhang, Dawei Liu, Xin Huang
doaj +1 more source
Longitude : a privacy-preserving location sharing protocol for mobile applications [PDF]
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern.
A. Beresford +14 more
core +1 more source
ACC forms via aggregating prenucleation clusters that gatekeep its chemical composition. Ion identity steers the path: Ba and Sr substitute Ca in clusters, thereby inhibiting nucleation, with a dose‐dependent switch of Sr to induction. Mg partitions into Mg‐rich and Mg‐poor clusters; the latter form ACC, expelling Mg.
Qianyu Zhao +9 more
wiley +1 more source
Proxy Re-Encryption Scheme Supporting Keyword Search in Email System [PDF]
To authorize others to deal with encrypted mails and enable the search of encrypted mails in an encrypted email system,this paper proposes a proxy re-encryption scheme that supports keyword search for email systems.In this scheme,searchable encryption ...
NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
doaj +1 more source

