نتایج جستجو برای: proxy model
تعداد نتایج: 2124051 فیلتر نتایج به سال:
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. In this paper, by using the techniques of Canetti-Hohenberger and Kuros...
Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-today office concerns. Therefore, a proxy signature scheme is necessary in this scenario. Although identity-based proxy signature schemes have bee...
Proxy re-signatures are generally used for the delegation of signatures to a semi-trusted proxy which transforms the signatures between the users of the system. Its a handy primitive for network security and automated delegations in hierarchical organizations. Though proxy re-signature schemes that are secure in the standard model are available, none of them have addressed the security notion o...
A proxy re-encryption scheme enables a proxy to re-encrypt a ciphertext and designate it to a delegatee. Proxy re-encryption schemes have been found useful in many applications, including e-mail forwarding, law-enforcement monitoring, and content distribution. Libert and Vergnaud presented the first construction of unidirectional proxy re-encryption scheme with chosen ciphertext security in the...
Proxy signature is an important cryptographic primitive and has been suggested in numerous applications. In this paper, we present an attack on the aggregate-signaturebased proxy signature schemes, then point out there are two flaws in BPW notion of security for proxy signature. Furthermore, we give arguments for partial delegation with warrant proxy signature schemes. We construct a new proxy ...
An identity-based multi-proxy signature is a type of proxy signatures in which the delegation of signing right is distributed among a number of proxy signers. In this type of cryptographic primitive, cooperation of all proxy signers in the proxy group generates the proxy signatures of roughly the same size as that of standard proxy signatures on behalf of the original signer, which is more effi...
T his study investigates the short-run and long-run impact of real exchange rate misalignment and volatility on Indonesian export to the US by exploiting the disaggregated data of export volume. The proxy of real exchange rate misalignment was obtained by estimating the fundamental equilibrium exchange rate (FEER) model, and the exchange rate volatility measured by employing the GARC...
Proxy signature is a special signature, it allows an original signer to delegate her signing capability to a proxy signer and the proxy signer can produce a signature on behalf of the original signer. At present, most of proxy signature in essence consists of two signatures. To overcome the problem, we propose a short efficient proxy signature scheme based on a certificateless signature scheme....
Two-state cooperativity is an important characteristic in protein folding. It is defined by a depletion of states that lie energetically between folded and unfolded conformations. There are different ways to test for two-state cooperativity; however, most of these approaches probe indirect proxies of this depletion. Generalized-ensemble computer simulations allow us to unambiguously identify th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید