نتایج جستجو برای: proxy model

تعداد نتایج: 2124051  

Journal: :IACR Cryptology ePrint Archive 2010
Jun Shao Zhenfu Cao Peng Liu

In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. In this paper, by using the techniques of Canetti-Hohenberger and Kuros...

2011
Yu-Chi Chen Chao-Liang Liu Gwoboa Horng Kuo-Chang Chen

Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-today office concerns. Therefore, a proxy signature scheme is necessary in this scenario. Although identity-based proxy signature schemes have bee...

Journal: :IACR Cryptology ePrint Archive 2012
S. Sree Vivek S. Sharmila Deva Selvi Guhan Balasubramanian C. Pandu Rangan

Proxy re-signatures are generally used for the delegation of signatures to a semi-trusted proxy which transforms the signatures between the users of the system. Its a handy primitive for network security and automated delegations in hierarchical organizations. Though proxy re-signature schemes that are secure in the standard model are available, none of them have addressed the security notion o...

Journal: :JDCTA 2010
Liming Fang Willy Susilo Yongjun Ren Chunpeng Ge Jiandong Wang

A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption schemes have been found useful in many applications, including e-mail forwarding, law-enforcement monitoring, and content distribution. Libert and Vergnaud presented the first construction of unidirectional proxy re-encryption scheme with chosen ciphertext security in the...

Journal: :IACR Cryptology ePrint Archive 2004
Qin Wang Zhenfu Cao

Proxy signature is an important cryptographic primitive and has been suggested in numerous applications. In this paper, we present an attack on the aggregate-signaturebased proxy signature schemes, then point out there are two flaws in BPW notion of security for proxy signature. Furthermore, we give arguments for partial delegation with warrant proxy signature schemes. We construct a new proxy ...

Journal: :IACR Cryptology ePrint Archive 2014
Maryam Rajabzadeh Asaar Mahmoud Salmasizadeh Willy Susilo

An identity-based multi-proxy signature is a type of proxy signatures in which the delegation of signing right is distributed among a number of proxy signers. In this type of cryptographic primitive, cooperation of all proxy signers in the proxy group generates the proxy signatures of roughly the same size as that of standard proxy signatures on behalf of the original signer, which is more effi...

Journal: Iranian Economic Review 2019

T his study investigates the short-run and long-run impact of real exchange rate misalignment and volatility on Indonesian export to the US by exploiting the disaggregated data of export volume. The proxy of real exchange rate misalignment was obtained by estimating the fundamental equilibrium exchange rate (FEER) model, and the exchange rate volatility measured by employing the GARC...

2011
Jianhong Zhang Yuanbo Cui Min Xu Jiancheng Zou

Proxy signature is a special signature, it allows an original signer to delegate her signing capability to a proxy signer and the proxy signer can produce a signature on behalf of the original signer. At present, most of proxy signature in essence consists of two signatures. To overcome the problem, we propose a short efficient proxy signature scheme based on a certificateless signature scheme....

Journal: :Biophysical journal 2011
Tristan Bereau Markus Deserno Michael Bachmann

Two-state cooperativity is an important characteristic in protein folding. It is defined by a depletion of states that lie energetically between folded and unfolded conformations. There are different ways to test for two-state cooperativity; however, most of these approaches probe indirect proxies of this depletion. Generalized-ensemble computer simulations allow us to unambiguously identify th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید