Results 41 to 50 of about 119,685 (321)
An Identity-Based Group Signature with Membership Revocation in the Standard Model [PDF]
Group signatures allow group members to sign an arbitrary number\ud of messages on behalf of the group without revealing their\ud identity. Under certain circumstances the group manager holding a\ud tracing key can reveal the identity of the signer from ...
Hartel, Pieter +3 more
core +3 more sources
Lattice-based Group Signature Scheme with Verifier-local Revocation [PDF]
International audienceSupport of membership revocation is a desirable functionality for any group signature scheme. Among the known revocation approaches, verifier-local revocation (VLR) seems to be the most flexible one, because it only requires the ...
A. Fiat +32 more
core +4 more sources
CONSIDERATIONS CONCERNING THE REVOCATION OF ADMINISTRATIVE ACTS WHICH ARE CONTRARY TO EUROPEAN UNION LAW [PDF]
In the process of adopting administrative acts, public authorities are obliged to respect both the national provisions legally superior and European Union law with superior legal force and also the general principles of law, including those imposed by ...
CONSTANTA MATUSESCU
doaj
Efficient Revocable ID-Based Signature With Cloud Revocation Server
Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management.
Xiaoying Jia +3 more
doaj +1 more source
An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul +3 more
core +2 more sources
Ciphertext Outdate Attacks on the Revocable Attribute-Based Encryption Scheme With Time Encodings
Cloud storage is a new computing paradigm that allows users to store their data in the cloud and access them anytime anywhere through the Internet. To address the various security issues that may arise in the cloud storage accessed by a large number of ...
Kwangsu Lee
doaj +1 more source
Anonymous authentication system enables mobile users to anonymously authenticate themselves to an authorized entity such as a Group Manager (GM) without revealing any privacy information.
Amang Sudarsono, Mike Yuliana
doaj +1 more source
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a ...
Ling, San +3 more
core +1 more source
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley +1 more source
Suspended Sentences and Free-Standing Probation Orders in U.S. Guidelines Systems: A Survey and Assessment [PDF]
Much academic attention has been directed towards management models, but there is limited research into the details of how these models are put to use in organizations.
Elg, Mattias, Langstrand, Jostein
core +3 more sources

