Results 41 to 50 of about 138,426 (219)
Multi-use unidirectional proxy re-signatures [PDF]
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive named proxy re-signatures where a proxy turns a signature computed under Alice's secret key into one from Bob on the same message. The semi-trusted proxy does not learn either party's signing key and cannot sign arbitrary messages on behalf of Alice or Bob.
Libert, Benoît, Vergnaud, Damien
openaire +2 more sources
The newfound relationship between extrachromosomal DNAs and excised signal circles
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley +1 more source
A Novel Anonymous Proxy Signature Scheme
Recently, several studies about proxy signature schemes have been conducted. In 2009, Yu et al. proposed an anonymous proxy signature scheme attempting to protect the proxy signer's privacy from outsiders.
Jue-Sam Chou
doaj +1 more source
Cryptanalysis of ID based Proxy-Blind signature scheme over lattice
In this article we review the ID Based Proxy-Blind signature scheme proposed by Zhang et al. and we give an attack on the scheme revealing the master secret key used in the construction of their scheme.
Swati Rawal, Sahadeo Padhye
doaj +1 more source
Time Stamped Proxy Blind Signature Scheme With Proxy Revocation Based on Discrete Logarithm Problem [PDF]
Proxy blind signature combines both the properties of blind signature and proxy signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer.
Panda, Suryakanta
core
Magnetic variability in the young solar analog KIC 10644253: Observations from the Kepler satellite and the HERMES spectrograph [PDF]
The continuous photometric observations collected by the Kepler satellite over 4 years provide a whelm of data with an unequalled quantity and quality for the study of stellar evolution of more than 200000 stars.
Ballot, J. +14 more
core +5 more sources
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice +16 more
wiley +1 more source
Forward secure proxy signature scheme
A forward secure proxy signature scheme was proposed combining the concept of forward security with proxy signature. This means even if an adversary has gotten the current proxy signers’ key.
WANG Xiao-ming +2 more
doaj +2 more sources
A Strong Proxy Signature Scheme based on Partial Delegation [PDF]
Proxy signature scheme is an extension of digital signature scheme first introduced by Mambo et al. in 1996, which allows a signer to delegate the signing capability to a designated person, called a proxy signer.
Mudgil, Pushpendra, Murmu, Chandni
core
A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection [PDF]
[[abstract]]To detect any (unknown) virus, automatic signature schemes are proposed to be embedded in honestly-made compilers. But compiling load is centralized on the compiler makers.
Hwang, Shin-Jia
core +1 more source

