Results 11 to 20 of about 120,111 (165)

Multi-use unidirectional proxy re-signatures [PDF]

open access: yesProceedings of the 15th ACM conference on Computer and communications security, 2008
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive named proxy re-signatures where a proxy turns a signature computed under Alice's secret key into one from Bob on the same message. The semi-trusted proxy does not learn either party's signing key and cannot sign arbitrary messages on behalf of Alice or Bob.
Libert, Benoît, Vergnaud, Damien
openaire   +2 more sources

ID-based Sever-aided Verification Proxy Re-signature Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
Signature verification in the existing ID-based proxy re-signature schemes includes time-consuming bilinear pairing operations,which are not suitable for low-power devices.In order to improve the efficiency of signature verification,combined with server ...
YANG Xiaodong,LI Yanan,ZHOU Qixu,GAO Guojuan,WANG Caifen
doaj   +1 more source

A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another

open access: yesCybernetics and Information Technologies, 2021
Proxy Re-Signature (PRS) complements well-established digital signature service. Blaze-Bleumer-Strauss discussed PRS in 1998 for translating a signature on a message from Alice into a signature from Bob on the same message at semi-trusted proxy which ...
Chaudhari Shilpa   +2 more
doaj   +1 more source

E-government Data Security Exchange Scheme Based on Proxy Re-signature [PDF]

open access: yesJisuanji gongcheng, 2017
Considering the security problem of e-government data exchange,a double trapdoor Hash function is proposed by using discrete logarithm assumption.Moreover,this function is proved to satisfy the properties,such as validity,trapdoor collision,collision ...
YANG Xiaodong,GAO Guojuan,ZHOU Qixu,LI Yanan,WANG Caifen
doaj   +1 more source

Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme

open access: yesEntropy, 2023
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic ...
Yongli Tang   +4 more
doaj   +1 more source

Empirical analysis of the solar contribution to global mean air surface temperature change [PDF]

open access: yes, 2009
The solar contribution to global mean air surface temperature change is analyzed by using an empirical bi-scale climate model characterized by both fast and slow characteristic time responses to solar forcing: $\tau_1 =0.4 \pm 0.1$ yr, and $\tau_2= 8 \pm
Brohan   +35 more
core   +1 more source

Multi-User and Multi-Replica Public Data Audit Scheme Supporting User Revocation [PDF]

open access: yesJisuanji gongcheng, 2020
Cloudstorage can help save local storage space when dealing with massive data,but increases the risk of data loss or damage.Although the existing audit schemes can verify the integrity of cloud data,it is mainly used in single-user single-replica ...
YANG Xiaodong, PEI Xizhen, CHEN Guilan, WANG Meiding, WANG Caifen
doaj   +1 more source

Integrity Verification Scheme for Cloud Data Based on Proxy Re-signature [PDF]

open access: yesJisuanji gongcheng, 2018
A new integrity verification scheme for cloud data is proposed to solve the problems of dynamic data updating and user revocation.The new scheme uses proxy re-signature to transfer data ownership and revoke users.By using the random masking technique,it ...
YANG Xiaodong,LIU Tingting,YANG Ping,AN Faying,XIAO Likun,WANG Caifen
doaj   +1 more source

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security [PDF]

open access: yes, 2009
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus
B. Libert   +15 more
core   +5 more sources

Magnetic variability in the young solar analog KIC 10644253: Observations from the Kepler satellite and the HERMES spectrograph [PDF]

open access: yes, 2016
The continuous photometric observations collected by the Kepler satellite over 4 years provide a whelm of data with an unequalled quantity and quality for the study of stellar evolution of more than 200000 stars.
Ballot, J.   +14 more
core   +5 more sources

Home - About - Disclaimer - Privacy