ESCORTING DATA FROM CCA2 ATTACK ON SAC

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Escorting Ras

Ras proteins are best known to function on the plasma membrane to mediate growth factor signaling. Controlling the length of time that Ras proteins stay on the plasma membrane is an effective way to properly modulate the intensity and duration of growth factor signaling. It has been shown previously that H- and N-Ras proteins in the GTP-bound state can be ubiquitylated via a K-63 linkage, which...

متن کامل

Escorting STAT5A

ome transcription factors take a chaperone to the nuclear dance. On page 469, Williams et al. show that STAT5A gets this escort from the ERBB4 receptor tyrosine kinase. ERBB4 becomes an escort upon activation by growth factors such as heregulin (HRG). The activated receptor is known to recruit and phos-phorylate STAT5A and get cleaved, thus releasing ERBB4's intracellular domain (4ICD). William...

متن کامل

Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack

An Attribute-Based Signcryption (ABSC) is a natural extension of Attribute-Based Encryption (ABE) and Attribute-Based Signature (ABS), where we have the message confidentiality and authenticity together. Since the signer privacy is captured in security of ABS, it is quite natural to expect that the signer privacy will also be preserved in ABSC. In this paper, first we propose an ABSC scheme whi...

متن کامل

Bounded CCA2-Secure Encryption

Whereas encryption schemes withstanding passive chosenplaintext attacks (CPA) can be constructed based on a variety of computational assumptions, only a few assumptions are known to imply the existence of encryption schemes withstanding adaptive chosen-ciphertext attacks (CCA2). Towards addressing this asymmetry, we consider a weakening of the CCA2 model — bounded CCA2-security — wherein securi...

متن کامل

A Mix-Net from Any CCA2 Secure Cryptosystem

We construct a provably secure mix-net from any CCA2 secure cryptosystem. The mix-net is secure against active adversaries that statically corrupt less than λ out of k mix-servers, where λ is a threshold parameter, and it is robust provided that at most min(λ− 1, k − λ) mix-servers are corrupted. The main component of our construction is a mix-net that outputs the correct result if all mix-serv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Information Sciences and Computing

سال: 2011

ISSN: 0973-9092

DOI: 10.18000/ijisac.50098