Hierarchy problem in the Standard Model and extended Higgs potential with scale symmetry [PDF]
In this research we introduce a model by adding two singlet scalars to the Higgs potential of the Standard Model and imposing scale symmetry to address the hierarchy problem. The scale symmetry plays a crucial role here.
Karim Ghorbani, Parsa Ghorbani
doaj +1 more source
An Efficient Public-Key Dual-Receiver Encryption Scheme
Public-key dual-receiver encryption (PK-DRE) is a kind of particular public-key encryption for enabling two independent recipients to obtain the same plaintext from the same ciphertext.
Chenglong Gao+3 more
doaj +1 more source
Forward Secure Lattice-Based Sequential Aggregate Signature Schemes in Stan-dard Model
In the forward secure sequential aggregate (FssAgg) signature scheme, the signer combines signatures generated in different intervals under different secret keys incrementally and sequentially in a layered “onion-like” fashion with the first signature ...
XIE Jia, HU Yupu, GAO Juntao, WANG Baocang, JIANG Mingming
doaj +1 more source
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions
A two-party authenticated key exchange (AKE) protocol allows each of the two parties to share a common secret key over insecure channels, even in the presence of active adversaries who can actively control and modify the exchanged messages.
Janaka Alawatugoda
doaj +1 more source
The Number of Elementary Fermions and the Electromagnetic Coupling
Electric charges and masses of elementary fermions of the Standard Model and fundamental physical constants (speed of light in vacuum, Planck constant, gravitational constant, vacuum permittivity, electron charge) are related through a simple equation ...
Liberato De Caro
doaj +1 more source
Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj +1 more source
User-Oriented Approach to Content Improvement in Official Library Websites
The creation of official websites of modern libraries has opened up for them fundamentally new opportunities to present a wide range of information resources and services for remote users.
N. I. Gendina+2 more
doaj +1 more source
Summary of the International Patient Safety Conference, June 28—29, 2019, Kathmandu, Nepal
Globally, medical errors are associated with an estimated $42 billion in costs to healthcare systems. A variety of errors in the delivery of healthcare have been identified by the World Health Organization and it is believed that about 50% of all errors ...
Deepak C. Bajracharya+11 more
doaj +1 more source
Highlights from the Compact Muon Solenoid (CMS) Experiment
The highlights of the recent activities and physics results leading up to the summer of 2018 from the Compact Muon Solenoid (CMS) experiment at the CERN Large Hadron Collider (LHC) are presented here.
Saranya Samik Ghosh+1 more
doaj +1 more source
Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing
Public key encryption with equality test (PKE-ET) enables anyone to perform equivalence test between two messages encrypted under distinct public keys.
Jianfei Sun+3 more
doaj +1 more source