Results 51 to 60 of about 1,131 (250)
Group-Based Proxy Re-encryption Scheme [PDF]
Recently, proxy re-encryption scheme received much attention. A proxy re-encryption used for divert ciphertext from one group to another without revealing underlying plaintext is proposed in this paper. The scheme is bidirectional and any member can independently decrypt the ciphertext encrypted to its group.
Chunbo Ma, Jun Ao
openaire +1 more source
Itch‐induced tick removal (IITR): An acquired neuroimmune mechanism, itch‐induced tick removal, develops after repeated tick exposure, mobilizing T cells and macrophages at the tick bite site to trigger a rapid scratching response that facilitates timely tick removal within a critical window that precedes the transmission of many tick‐borne pathogens ...
Johannes S. P. Doehl +27 more
wiley +1 more source
Encrypted domain reversible data hiding based on proxy re-encryption in distributed environment
Reversible data hiding in encrypted domain (RDH-ED) addresses data security and privacy protection issues. However, traditional RDH-ED algorithms face challenges in terms of dynamic authorization, multiparty collaboration, and secure sharing in ...
Xingyao Wang, Haiyang Ding
doaj +1 more source
Delivery of Pleckstrin‐Homology Domains Suppresses PI3K/Akt Signaling and Breast Cancer Metastasis
Current therapies curb tumor growth but not metastasis. Obscurin, a giant metastasis suppressor lost in breast cancer, restrains PI3K/Akt signaling but is impractical to restore. We deploy a mini‐obscurin, comprising the obscurin‐PH‐domain, which sequesters PI3K‐p85, potently suppressing invasion and metastasis.
Matthew Eason +12 more
wiley +1 more source
Chosen-ciphertext secure proxy re-encryption [PDF]
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a different key. The proxy cannot, however, learn anything about the messages encrypted under either key.
Ran Canetti, Susan Hohenberger
openaire +1 more source
The authors engineer colorectal cancer cells with reduced redundancy of UHRF1 and DNMT1, key DNA methylation maintenance factors, lowering the maintenance threshold and sensitizing cells to inhibition. They develop reporter assays driven by endogenous tumor‐suppressor gene promoters with enhanced sensitivity and dynamic range to demethylating drugs ...
Cuicui Xia +15 more
wiley +1 more source
Dual‐receiver proxy re‐encryption is a cryptographic technique that enables secure data sharing among multiple authorized users or entities. It has gained significant attention for its ability to manage access permissions, data confidentiality, and ...
Eman Abouelkheir
doaj +1 more source
A smart grid is a new ecosystem, which is made by combining a number of smart Internet of Things (IoT) devices that manage wide energy sources by increasing the efficiency and reliability of the smart energy systems.
Saddam Hussain +7 more
doaj +1 more source
Glutamine deprivation triggers transient DNA damage yet activates adaptive repair in hepatocellular carcinoma cells. We identify TRIB3 as a stress‐induced nuclear scaffold that associates with DDX5 and G‐quadruplex DNA atBRCA1 andRAD51AP1 promoters. TRIB3 loss increases G4 accumulation, suppresses HR gene transcription, elevates γ‐H2A.X, and sensitizes
Qiang Ji +10 more
wiley +1 more source
Delegation of Decryption Rights With Revocability From Learning With Errors
The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 1998. It, defined as proxy re-encryption, allows a semi-trusted proxy to convert a ciphertext intended for a party to another ciphertext of the same ...
Wei Yin +6 more
doaj +1 more source

