Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Rajeev A. Sahu"'
Publikováno v:
Progress in Cryptology-AFRICACRYPT 2022 ISBN: 9783031174322
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9c685b9087d255e7a35aa29696fa1bef
https://doi.org/10.1007/978-3-031-17433-9_11
https://doi.org/10.1007/978-3-031-17433-9_11
Publikováno v:
Provable and Practical Security ISBN: 9783030904012
ProvSec
ProvSec
Symmetric searchable encryption (SSE) allows to outsource encrypted data to an untrusted server and retain searching capabilities. This is done without impacting the privacy of both the data and the search/update queries. In this work we put forth a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::83fc58a18e518940774df1198c053808
http://orbilu.uni.lu/handle/10993/47997
http://orbilu.uni.lu/handle/10993/47997
Publikováno v:
Journal of Hardware and Systems Security. 3:12-25
Since the last decade, the public-key encryption with keyword search (PEKS) has been studied as a popular technique for searching data over encrypted files. The notion finds useful application for fine-grained data search on outsourced encrypted data
Publikováno v:
Foundations and Practice of Security: 13th International Symposium, FPS 2020, Montreal, QC, Canada, December 1–3, 2020, Revised Selected Papers
FPS 2020: 13th International Symposium on Foundations & Practice of Security
FPS 2020: 13th International Symposium on Foundations & Practice of Security, Dec 2020, Montreal, Canada. pp.137-146, ⟨10.1007/978-3-030-70881-8_9⟩
Foundations and Practice of Security ISBN: 9783030708801
FPS
FPS 2020: 13th International Symposium on Foundations & Practice of Security
FPS 2020: 13th International Symposium on Foundations & Practice of Security, Dec 2020, Montreal, Canada. pp.137-146, ⟨10.1007/978-3-030-70881-8_9⟩
Foundations and Practice of Security ISBN: 9783030708801
FPS
We propose a scheme to preserve the anonymity of users in proof-of-asset transactions. We assume bitcoin-like cryptocurrency systems in which a user must prove the strength of its assets (i.e., solvency), prior conducting further transactions. The tr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8a56675948149fdc4366c4192f4288e7
http://arxiv.org/abs/2009.13978
http://arxiv.org/abs/2009.13978
Publikováno v:
Journal of Mathematical Cryptology, Vol 11, Iss 2, Pp 63-84 (2017)
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provides anonymity to the proxy sender while also providing a mechanism to the original sender to expose the identity of the proxy sender in case of misuse.
Autor:
Soultana Ellinidou, Veronika Kuchta, Rajeev Anand Sahu, Jean-Michel Dricot, Olivier Markowitch, Suman Bala, Gaurav Sharma
Publikováno v:
Transactions on Emerging Telecommunications Technologies, 30 (6
A symmetric group key agreement protocol enables the group members to derive a shared session key for secure communication among them, whereas an asymmetric one facilitates security to any communication from outside, without adding outsiders into the
Publikováno v:
Introduction to Cryptography
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c6452dc6a3b3a329b6861e81ea1c07a2
https://doi.org/10.1201/9781315114590-1
https://doi.org/10.1201/9781315114590-1
Publikováno v:
Introduction to Cryptography
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e86043f9f2b1270d2de7d0dc426b7018
https://doi.org/10.1201/9781315114590-4
https://doi.org/10.1201/9781315114590-4