ESCORTING DATA FROM CCA2 ATTACK ON SAC
نویسندگان
چکیده
منابع مشابه
Escorting Ras
Ras proteins are best known to function on the plasma membrane to mediate growth factor signaling. Controlling the length of time that Ras proteins stay on the plasma membrane is an effective way to properly modulate the intensity and duration of growth factor signaling. It has been shown previously that H- and N-Ras proteins in the GTP-bound state can be ubiquitylated via a K-63 linkage, which...
متن کاملEscorting STAT5A
ome transcription factors take a chaperone to the nuclear dance. On page 469, Williams et al. show that STAT5A gets this escort from the ERBB4 receptor tyrosine kinase. ERBB4 becomes an escort upon activation by growth factors such as heregulin (HRG). The activated receptor is known to recruit and phos-phorylate STAT5A and get cleaved, thus releasing ERBB4's intracellular domain (4ICD). William...
متن کاملAttribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack
An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption (ABE) and Attribute-Based Signature (ABS), where we have the message confidentiality and authenticity together. Since the signer privacy is captured in security of ABS, it is quite natural to expect that the signer privacy will also be preserved in ABSC. In this paper, first we propose an ABSC scheme whi...
متن کاملBounded CCA2-Secure Encryption
Whereas encryption schemes withstanding passive chosenplaintext attacks (CPA) can be constructed based on a variety of computational assumptions, only a few assumptions are known to imply the existence of encryption schemes withstanding adaptive chosen-ciphertext attacks (CCA2). Towards addressing this asymmetry, we consider a weakening of the CCA2 model — bounded CCA2-security — wherein securi...
متن کاملA Mix-Net from Any CCA2 Secure Cryptosystem
We construct a provably secure mix-net from any CCA2 secure cryptosystem. The mix-net is secure against active adversaries that statically corrupt less than λ out of k mix-servers, where λ is a threshold parameter, and it is robust provided that at most min(λ− 1, k − λ) mix-servers are corrupted. The main component of our construction is a mix-net that outputs the correct result if all mix-serv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Information Sciences and Computing
سال: 2011
ISSN: 0973-9092
DOI: 10.18000/ijisac.50098