Results 21 to 30 of about 158,618 (286)

Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation

open access: yesEntropy, 2022
We present a scheme for teleporting an unknown, two-particle entangled state with a message from a sender (Alice) to a receiver (Bob) via a six-particle entangled channel.
Qiming Luo   +3 more
doaj   +1 more source

Proxy Signatures Secure Against Proxy Key Exposure [PDF]

open access: yes, 2008
We provide an enhanced security model for proxy signatures that captures a more realistic set of attacks than previous models of Boldyreva et al. and of Malkin et al.. Our model is motivated by concrete attacks on existing schemes in scenarios in which proxy signatures are likely to be used. We provide a generic construction for proxy signatures secure
Jacob C. N. Schuldt   +2 more
openaire   +1 more source

Magnetic nulls and super-radial expansion in the solar corona [PDF]

open access: yes, 2017
Magnetic fields in the sun's outer atmosphere -- the corona -- control both solar-wind acceleration and the dynamics of solar eruptions. We present the first clear observational evidence of coronal magnetic nulls in off-limb linearly polarized ...
Burkepile, Joan   +7 more
core   +3 more sources

Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator

open access: yesМоделирование и анализ информационных систем, 2014
The article suggests the method of anti-virus protection of mobile devices based on the usage of proxy digital signatures and an (n;t)-threshold proxy signature scheme with an arbitrator.
E. A. Tolyupa
doaj   +1 more source

A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection [PDF]

open access: yes
[[abstract]]To detect any (unknown) virus, automatic signature schemes are proposed to be embedded in honestly-made compilers. But compiling load is centralized on the compiler makers.
Hwang, Shin-Jia
core   +1 more source

An Improved Proxy Multi-Signature, Multi-Proxy Signature and Multi-Proxy Multi-Signature Scheme

open access: yesJournal of Networks, 2011
Zhou’s proxy multi-signature scheme was a safe and effective scheme, but this scheme was not safety enough. In this work, security analysis was given to the scheme and results showed that the scheme was very easy aggressed by the forgery attack. The paper proposed that any attacker can sign some certain unauthorized messages after the attacker knows a ...
openaire   +1 more source

Provably secure and efficient proxy signature scheme

open access: yesTongxin xuebao, 2014
The size of proxy signature secret key in proxy signature scheme based on lattice basis delegation in fixed di-mension or bonsai tree is greater than that of original signature secret key.
Jie ZENG, Wei NIE
doaj   +2 more sources

Attacks on One Designated Verifier Proxy Signature Scheme

open access: yesJournal of Applied Mathematics, 2012
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier.
Baoyuan Kang
doaj   +1 more source

Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [PDF]

open access: yes, 2007
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation. The scheme uses a binding-blinding technique to avoid secure channel requirements in the key issuance stage.
Das, Manik Lal   +2 more
core  

Discovery Prospects for a Supernova Signature of Biogenic Origin

open access: yes, 2011
Approximately 2.8 Myr before the present our planet was subjected to the debris of a supernova explosion. The terrestrial proxy for this event was the discovery of live atoms of 60Fe in a deep-sea ferromanganese crust.
Basu   +27 more
core   +1 more source

Home - About - Disclaimer - Privacy