A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality
Encryption technologies have become one of the most prevalent solutions to safeguard data confidentiality in many real-world applications, e.g., cloud-based data storage systems.
Kai He+6 more
doaj +1 more source
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong+4 more
doaj +1 more source
Cryptanalysis and Improvement of a Proxy Signcryption Scheme in the Standard Computational Model
Proxy signcryption is essential security primitive for emerging secure communication such as e-business, mobile agents, online voting, contract signing, and online auction.
Abdul Waheed+7 more
doaj +1 more source
Wind Tunnel Testing of ONERA-M, AGARD-B and HB-2 Standard Models at Off-Design Conditions
Published results for standard wind tunnel models at non-standard test conditions are quite rare and/or may not be available. It has been found that those results are a useful aid in preparations for a number of wind tunnel tests in the Military ...
Dijana Damljanović+4 more
doaj +1 more source
A skeleton model to enumerate standard puzzle sequences [PDF]
Guo-Niu Han [arXiv:2006.14070 [math.CO]] has introduced a new combinatorial object named standard puzzle. We use digraphs to show the relations between numbers in standard puzzles and propose a skeleton model. By this model, we solve the enumeration problem of over fifty thousand standard puzzle sequences.
arxiv
Higgs Boson Mass Bounds in the Standard and Minimal Supersymmetric Standard Model with Four Generations [PDF]
We study the question of distinguishability of the Higgs sector between the standard model with four generations(SM4) and the minimal supersymmetric standard model with four generations (MSSM4). We find that a gap exists between the SM4 and MSSM4 Higgs boson masses for a range of the fourth generation fermion mass considered in the analysis at a fixed ...
arxiv +1 more source
Gauge Interactions in the Dual Standard Model [PDF]
We present a geometric argument for the transformation properties of SU(5) --> S(U(3) x U(2)) monopoles under the residual gauge symmetry. This strongly supports the proposal that monopoles of the dual standard model interact via a gauge theory of the standard model symmetry group, with the monopoles having the same spectrum as the standard model ...
arxiv +1 more source
Identity-based incremental signature scheme from lattices
By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against
Miaomiao TIAN, Jing CHEN, Hong ZHONG
doaj
A Note on Intended and Standard Models
This note discusses some problems concerning intended, standard, and nonstandard models of mathematical theories. We pay attention to the role of extremal axioms in attempts at a unique characterization of the intended models. We recall also Jan Woleński’
Pogonowski Jerzy
doaj +1 more source
Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters
Identity-based encryption (IBE), and its hierarchical extension (HIBE), are interesting cryptographic primitives that aim at the implicit authentication on the users’ public keys by using users’ identities directly.
Yuan Zhang+4 more
doaj +1 more source