Results 61 to 70 of about 19,760 (270)

Proxy Re-encryption from Lattices [PDF]

open access: yes, 2014
We propose a new unidirectional proxy re-encryption scheme based on the hardness of the LWE problem. Our construction is collusionsafe and does not require any trusted authority for the re-encryption key generation. We extend a recent trapdoor definition for a lattice of Micciancio and Peikert. Our proxy re-encryption scheme is provably CCA-1 secure in
openaire   +1 more source

Efficient Unidirectional Proxy Re-Encryption

open access: yes, 2010
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re-encryption key given by Alice, and cannot learn anything about the plaintext encrypted.
CHOW, Sherman   +3 more
openaire   +3 more sources

Experimental demonstration of an isotope-sensitive warhead verification technique using nuclear resonance fluorescence

open access: yes, 2018
Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no
Danagoulian, Areg   +2 more
core   +1 more source

The Mitochondrial Guardian α‐Amyrin Mitigates Alzheimer's Disease Pathology via Modulation of the DLK‐SARM1‐ULK1 Axis

open access: yesAdvanced Science, EarlyView.
Dietary habits play a key role in chronic diseases, and higher annual consumption of fruit and vegetable may lower risk of dementia. Artificial intelligence predicts the lipid‐like compound α‐Amyrin (αA) from plants with edible peels as a drug candidate against Alzheimer's disease.
Shu‐Qin Cao   +36 more
wiley   +1 more source

An Enhanced Approach for CP-ABE with Proxy Re-encryption in IoT Paradigm

open access: yesJordanian Journal of Computers and Information Technology, 2022
In Internet of Things (IoT), encryption is a technique in which plaintext is converted to ciphertext to make it non-recovered by the attacker without secret key.
Nishant Doshi
doaj   +1 more source

Conditional Proxy Broadcast Re-Encryption

open access: yes, 2009
A proxy re-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts decryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, we introduce a more generalized notion of conditional proxy broadcast re-encryption (CPBRE).
CHU, Cheng-Kang   +4 more
openaire   +3 more sources

Group-Based Proxy Re-encryption Scheme [PDF]

open access: yes, 2009
Recently, proxy re-encryption scheme received much attention. A proxy re-encryption used for divert ciphertext from one group to another without revealing underlying plaintext is proposed in this paper. The scheme is bidirectional and any member can independently decrypt the ciphertext encrypted to its group.
Chunbo Ma, Jun Ao
openaire   +1 more source

Developing a Single‐Cell Spatial Transcriptomics Workflow for In Vivo Evaluation of Implanted Biomaterials

open access: yesAdvanced Science, EarlyView.
This work establishes a standardized, high‐resolution spatial transcriptomics workflow for characterizing host responses to biomaterial implants. Using the 10× Xenium platform, the pipeline integrates spatial mapping, subclustering, and functional enrichment to resolve immune and stromal cell organization at single‐cell resolution, enabling ...
Alex H.P. Chan   +7 more
wiley   +1 more source

High‐Fidelity Synthetic Data Replicates Clinical Prediction Performance in a Million‐Patient Diabetes Cohort

open access: yesAdvanced Science, EarlyView.
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño   +5 more
wiley   +1 more source

Encrypted domain reversible data hiding based on proxy re-encryption in distributed environment

open access: yesJournal of King Saud University: Computer and Information Sciences
Reversible data hiding in encrypted domain (RDH-ED) addresses data security and privacy protection issues. However, traditional RDH-ED algorithms face challenges in terms of dynamic authorization, multiparty collaboration, and secure sharing in ...
Xingyao Wang, Haiyang Ding
doaj   +1 more source

Home - About - Disclaimer - Privacy