Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Linru Zhang"'
Publikováno v:
PLoS ONE, Vol 19, Iss 7, p e0297855 (2024)
When large-scale electric vehicles are connected to the grid for unordered charging, it will seriously affect the stability and security of the power system. To solve this problem, this paper proposes a regional power network optimization scheduling
Externí odkaz:
https://doaj.org/article/fcc240a7169c411191a48be6e99ae125
Publikováno v:
Progress in Cryptology – INDOCRYPT 2020 ISBN: 9783030652760
INDOCRYPT
INDOCRYPT
There are lots of applications of inner-product functional encryption (IPFE). In this paper, we consider two important extensions of it. One is to enhance IPFE with access control such that only users with a pre-defined identity are allowed to comput
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::13f38c742d9cbd37ddbcee796a72cc1d
https://doi.org/10.1007/978-3-030-65277-7_30
https://doi.org/10.1007/978-3-030-65277-7_30
Publikováno v:
ICETE (2)
Publikováno v:
Information and Communications Security ISBN: 9783030610777
ICICS
ICICS
We propose a leakage-resilient inner-product functional encryption scheme (IPFE) in the bounded-retrieval model (BRM). This is the first leakage-resilient functional encryption scheme in the BRM. In our leakage model, an adversary is allowed to obtai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8204fb42e3b5d1d96f0d766177d41e5b
https://doi.org/10.1007/978-3-030-61078-4_32
https://doi.org/10.1007/978-3-030-61078-4_32
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030121457
ICISC
ICISC
It will be convenient for users if there is a market place that sells similar products provided by different suppliers. In physical world, this may not be easy, in particular, if the suppliers are from different regions or countries. On the other han
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::30a791d07e66e9d6afa0d04ac17080cb
https://doi.org/10.1007/978-3-030-12146-4_16
https://doi.org/10.1007/978-3-030-12146-4_16
Publikováno v:
Codes, Cryptology and Information Security ISBN: 9783030164577
C2SI
C2SI
The “all-or-nothing” notion of traditional public-key encryptions is found to be insufficient for many emerging applications in which users are only allowed to obtain a functional value of the ciphertext without any other information about the ci
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b0aa3622820f934be40c36035022a222
https://doi.org/10.1007/978-3-030-16458-4_10
https://doi.org/10.1007/978-3-030-16458-4_10
Publikováno v:
ICETE (2)
Oblivious RAM has been studied extensively. A recent direction is to allow the server to perform computations instead of being a storage device only. This model substantially reduces the communication between the server and the client, making constan
Publikováno v:
PST
Searchable compressed data structures (e.g.Burrows-Wheeler Transform) enable one to create a memoryefficient index for large datasets such as human genomes. On the other hand, storing such an index in a third-party server, e.g., cloud, may have the p
Publikováno v:
Information and Communications Security ISBN: 9783319894997
ICICS
ICICS
Decreasing costs in genome sequencing have been paving the way for personalised medicine. An increasing number of individuals choose to undergo disease risk tests provided by medical units. However, it poses serious privacy threats on both the indivi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6d535225b3ebea72df44801fc802a66d
https://doi.org/10.1007/978-3-319-89500-0_41
https://doi.org/10.1007/978-3-319-89500-0_41
Publikováno v:
Information and Communications Security ISBN: 9783319298139
ICICS
ICICS
We construct a statistically secure ORAM with computational overhead of \(O(\log ^2N\log \log N)\). Moreover, when accessing continuous blocks, our scheme can achieve an amortized complexity \(O(\log N\log \log N)\), which almost matches the theoreti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b8c9b4c100305d09f9e9b3ede550ec4
https://doi.org/10.1007/978-3-319-29814-6_33
https://doi.org/10.1007/978-3-319-29814-6_33