Zobrazeno 1 - 10
of 607
pro vyhledávání: '"forward security"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 6, Pp 102106- (2024)
Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but also dynamically update encrypted data stored on semi-trusted cloud server, effectively protec
Externí odkaz:
https://doaj.org/article/c0bdcf6ad013463b971573ab0c24b1eb
Autor:
Dilxat Ghopur
Publikováno v:
IEEE Access, Vol 12, Pp 90840-90852 (2024)
Ciphertext-Policy Attribute-Based Searchable Encryption (CP-ABSE) is one of the most suitable encryption mechanisms in cloud environments for its fine-grained access structure and keyword retrieval capability over the ciphertext. However, in the CP-A
Externí odkaz:
https://doaj.org/article/17f4061fc4574a138b8bdc32c19b06c9
Publikováno v:
IEEE Access, Vol 12, Pp 28926-28937 (2024)
Lightweight devices in the Internet of Things (IoT) typically need to store massive data on a cloud server with strong processing and storage capabilities for later retrieval and usage. Since these data contain the participant’s sensitive informati
Externí odkaz:
https://doaj.org/article/218f125e36af42beaa8b7bdde06a8a7c
Autor:
Mariusz Jurkiewicz
Publikováno v:
Journal of Telecommunications and Information Technology, Vol 2, Iss 2 (2024)
In this paper, we design and consider a new digital signature scheme with an evolving secret key, using random q-ary lattices as its domain. It is proved that, in addition to offering classic eu-cma security, the scheme is existentially forward unfor
Externí odkaz:
https://doaj.org/article/a5ba94809f50496490809798e9bb7f09
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 1 (2024)
A deterministic random bit generator (DRBG) generates pseudorandom bits from an unpredictable seed, i.e., a seed drawn from any random source with sufficient entropy. The current paper formalizes a security notion for a DRBG, in which an attacker may
Externí odkaz:
https://doaj.org/article/82c63e8fe54c484ba704d036bb752360
Autor:
Weiwei Yan, Sai Ji
Publikováno v:
Cyber Security and Applications, Vol 1, Iss , Pp 100006- (2023)
With the continuous development of the Internet of Things (IOT) and cloud computing, smart devices are playing an increasingly important role in users’ daily life. Dynamic searchable symmetric encryption (DSSE) schemes are popular on smart devices
Externí odkaz:
https://doaj.org/article/7c10ed2d466a465b93d7d853e8a47efe
Publikováno v:
IEEE Access, Vol 11, Pp 54607-54615 (2023)
In this paper, we propose a new digital signature primitive, called expander signature, and discuss its application in blockchain. The most promising advantage of expander signature is that a signer can generate all signatures at once using a powerfu
Externí odkaz:
https://doaj.org/article/0a2e77036da44165a6fe047ab36be6da
Publikováno v:
Applied Sciences, Vol 14, Iss 6, p 2287 (2024)
Dynamic searchable symmetric encryption (DSSE) enables searches over encrypted data as well as data dynamics such as flexible data addition and deletion operations. A major security concern in DSSE is how to preserve forward and backward privacy, whi
Externí odkaz:
https://doaj.org/article/734557aceed8449a8ec3bc0b74643465
Autor:
Simin Chen, Jiageng Chen
Publikováno v:
Heliyon, Vol 9, Iss 4, Pp e14917- (2023)
Group signatures allow users to sign messages on behalf of a group without revealing authority is capable of identifying the user who generated it. However, the exposure of the user's signing key will severely damage the group signature scheme. In or
Externí odkaz:
https://doaj.org/article/6d01ca48fbf047a4a3010420f1fba6b4
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.