Results 41 to 50 of about 138,426 (219)

Multi-use unidirectional proxy re-signatures [PDF]

open access: yesProceedings of the 15th ACM conference on Computer and communications security, 2008
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive named proxy re-signatures where a proxy turns a signature computed under Alice's secret key into one from Bob on the same message. The semi-trusted proxy does not learn either party's signing key and cannot sign arbitrary messages on behalf of Alice or Bob.
Libert, Benoît, Vergnaud, Damien
openaire   +2 more sources

The newfound relationship between extrachromosomal DNAs and excised signal circles

open access: yesFEBS Letters, EarlyView.
Extrachromosomal DNAs (ecDNAs) contribute to the progression of many human cancers. In addition, circular DNA by‐products of V(D)J recombination, excised signal circles (ESCs), have roles in cancer progression but have largely been overlooked. In this Review, we explore the roles of ecDNAs and ESCs in cancer development, and highlight why these ...
Dylan Casey, Zeqian Gao, Joan Boyes
wiley   +1 more source

A Novel Anonymous Proxy Signature Scheme

open access: yesAdvances in Multimedia, 2012
Recently, several studies about proxy signature schemes have been conducted. In 2009, Yu et al. proposed an anonymous proxy signature scheme attempting to protect the proxy signer's privacy from outsiders.
Jue-Sam Chou
doaj   +1 more source

Cryptanalysis of ID based Proxy-Blind signature scheme over lattice

open access: yesICT Express, 2020
In this article we review the ID Based Proxy-Blind signature scheme proposed by Zhang et al. and we give an attack on the scheme revealing the master secret key used in the construction of their scheme.
Swati Rawal, Sahadeo Padhye
doaj   +1 more source

Time Stamped Proxy Blind Signature Scheme With Proxy Revocation Based on Discrete Logarithm Problem [PDF]

open access: yes, 2013
Proxy blind signature combines both the properties of blind signature and proxy signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer.
Panda, Suryakanta
core  

Magnetic variability in the young solar analog KIC 10644253: Observations from the Kepler satellite and the HERMES spectrograph [PDF]

open access: yes, 2016
The continuous photometric observations collected by the Kepler satellite over 4 years provide a whelm of data with an unequalled quantity and quality for the study of stellar evolution of more than 200000 stars.
Ballot, J.   +14 more
core   +5 more sources

Transcriptional network analysis of PTEN‐protein‐deficient prostate tumors reveals robust stromal reprogramming and signs of senescent paracrine communication

open access: yesMolecular Oncology, EarlyView.
Combining PTEN protein assessment and transcriptomic profiling of prostate tumors, we uncovered a network enriched in senescence and extracellular matrix (ECM) programs associated with PTEN loss and conserved in a mouse model. We show that PTEN‐deficient cells trigger paracrine remodeling of the surrounding stroma and this information could help ...
Ivana Rondon‐Lorefice   +16 more
wiley   +1 more source

Forward secure proxy signature scheme

open access: yesTongxin xuebao, 2005
A forward secure proxy signature scheme was proposed combining the concept of forward security with proxy signature. This means even if an adversary has gotten the current proxy signers’ key.
WANG Xiao-ming   +2 more
doaj   +2 more sources

A Strong Proxy Signature Scheme based on Partial Delegation [PDF]

open access: yes, 2013
Proxy signature scheme is an extension of digital signature scheme first introduced by Mambo et al. in 1996, which allows a signer to delegate the signing capability to a designated person, called a proxy signer.
Mudgil, Pushpendra, Murmu, Chandni
core  

A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection [PDF]

open access: yes
[[abstract]]To detect any (unknown) virus, automatic signature schemes are proposed to be embedded in honestly-made compilers. But compiling load is centralized on the compiler makers.
Hwang, Shin-Jia
core   +1 more source

Home - About - Disclaimer - Privacy