Results 51 to 60 of about 1,131 (250)

Group-Based Proxy Re-encryption Scheme [PDF]

open access: yes, 2009
Recently, proxy re-encryption scheme received much attention. A proxy re-encryption used for divert ciphertext from one group to another without revealing underlying plaintext is proposed in this paper. The scheme is bidirectional and any member can independently decrypt the ciphertext encrypted to its group.
Chunbo Ma, Jun Ao
openaire   +1 more source

Discovery of an Adaptive Neuroimmune Response Driving Itch and Fast Tick Removal with Implications for Preventing Pathogen Transmission

open access: yesAdvanced Science, EarlyView.
Itch‐induced tick removal (IITR): An acquired neuroimmune mechanism, itch‐induced tick removal, develops after repeated tick exposure, mobilizing T cells and macrophages at the tick bite site to trigger a rapid scratching response that facilitates timely tick removal within a critical window that precedes the transmission of many tick‐borne pathogens ...
Johannes S. P. Doehl   +27 more
wiley   +1 more source

Encrypted domain reversible data hiding based on proxy re-encryption in distributed environment

open access: yesJournal of King Saud University: Computer and Information Sciences
Reversible data hiding in encrypted domain (RDH-ED) addresses data security and privacy protection issues. However, traditional RDH-ED algorithms face challenges in terms of dynamic authorization, multiparty collaboration, and secure sharing in ...
Xingyao Wang, Haiyang Ding
doaj   +1 more source

Delivery of Pleckstrin‐Homology Domains Suppresses PI3K/Akt Signaling and Breast Cancer Metastasis

open access: yesAdvanced Science, EarlyView.
Current therapies curb tumor growth but not metastasis. Obscurin, a giant metastasis suppressor lost in breast cancer, restrains PI3K/Akt signaling but is impractical to restore. We deploy a mini‐obscurin, comprising the obscurin‐PH‐domain, which sequesters PI3K‐p85, potently suppressing invasion and metastasis.
Matthew Eason   +12 more
wiley   +1 more source

Chosen-ciphertext secure proxy re-encryption [PDF]

open access: yesProceedings of the 14th ACM conference on Computer and communications security, 2007
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a different key. The proxy cannot, however, learn anything about the messages encrypted under either key.
Ran Canetti, Susan Hohenberger
openaire   +1 more source

Reduced Maintenance DNA Methylation Thresholds Enable Sensitive Reporter Assays for UHRF1 and DNMT1 Inhibition

open access: yesAdvanced Science, EarlyView.
The authors engineer colorectal cancer cells with reduced redundancy of UHRF1 and DNMT1, key DNA methylation maintenance factors, lowering the maintenance threshold and sensitizing cells to inhibition. They develop reporter assays driven by endogenous tumor‐suppressor gene promoters with enhanced sensitivity and dynamic range to demethylating drugs ...
Cuicui Xia   +15 more
wiley   +1 more source

Efficient provable dual receiver hybrid and light weight public key schemes based on the discrete logarithm problem without pairings

open access: yesIET Communications
Dual‐receiver proxy re‐encryption is a cryptographic technique that enables secure data sharing among multiple authorized users or entities. It has gained significant attention for its ability to manage access permissions, data confidentiality, and ...
Eman Abouelkheir
doaj   +1 more source

A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid

open access: yesIEEE Access, 2020
A smart grid is a new ecosystem, which is made by combining a number of smart Internet of Things (IoT) devices that manage wide energy sources by increasing the efficiency and reliability of the smart energy systems.
Saddam Hussain   +7 more
doaj   +1 more source

Glutamine Deprivation Triggers Tribbles Homolog 3 Dependent G‐Quadruplex Resolution to Maintain DNA Repair and Tumor Survival

open access: yesAdvanced Science, EarlyView.
Glutamine deprivation triggers transient DNA damage yet activates adaptive repair in hepatocellular carcinoma cells. We identify TRIB3 as a stress‐induced nuclear scaffold that associates with DDX5 and G‐quadruplex DNA atBRCA1 andRAD51AP1 promoters. TRIB3 loss increases G4 accumulation, suppresses HR gene transcription, elevates γ‐H2A.X, and sensitizes
Qiang Ji   +10 more
wiley   +1 more source

Delegation of Decryption Rights With Revocability From Learning With Errors

open access: yesIEEE Access, 2018
The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 1998. It, defined as proxy re-encryption, allows a semi-trusted proxy to convert a ciphertext intended for a party to another ciphertext of the same ...
Wei Yin   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy