نتایج جستجو برای: asymmetric verifiability

تعداد نتایج: 66461  

2013
V. Abinaya V. Ramesh

Attribute-based encryption (ABE) is a standard encryption that allows users to encrypt and decrypt data based on user attributes. I t is extension o f attribute set based encryption to improve scalability and flexibility w hile at the same time Inherits the feature of fine grained access control of ABE.It is flexible access control of encrypted data stored in the cloud. It is using access polic...

2009
Peter Y. A. Ryan Vanessa Teague

Code voting seeks to address the issues of privacy and integrity for Remote Internet Voting. It sidesteps many of the inherent vulnerabilities of the Internet and client platforms but it does not provide end-to-end verification that votes are counted as cast. In this paper, we propose a simple technique to enhance the verifiability of code voting by ensuring that the Vote Server can only access...

2010
CHIEN-YUAN LAI DONG-HER SHIH CHING-CHIANG CHEN

Unified Modeling Language (UML) is the Object Management Group (OMG) standard notation for object-oriented modeling. UML activity diagram (AD) are widely used to workflow and system flow in system analysis. However, activity diagram lacks support for simulation, dynamic semantics limits and verifiability capabilities. APN are a popular technique for modeling the control flow dimension of workfl...

2010
Allan Berrocal Rojas Elena Gabriela Barrantes S.

Most embedded systems for the avionics industry are considered safety critical systems; as a result, strict software development standards exist to ensure critical software is built with the highest quality possible. One of such standards, DO-178B, establishes a number of properties that software requirements must satisfy including: accuracy, non-ambiguity and verifiability. From a language per...

2011
Denise Demirel Maria Henning Peter Y. A. Ryan Steve A. Schneider Melanie Volkamer

Prêt à Voter is one of the most well-known and most extensively analysed electronic voting systems for polling stations. However, an analysis from a legal point of view has not yet been conducted. The purpose of this paper is to analyse the readiness of Prêt à Voter for legally binding federal elections in Germany. This case is of particular interest as Germany has with the Constitutional Court...

2015
Junzuo Lai Robert H. Deng Chaowen Guan A. B. Lewko T. Okamoto A. Sahai K. Takashima

Inside a dispersed foriegn atmosphere, anyone receives a untrusted company which has a change for better crucial allowing this foriegn to turn any kind of ABE ciphertext fulfilled through the wearer's features. Stability of ABE technique with outsourced decryption makes certain that a foe (including any destructive cloud) aren't going to be capable to study everything about the encrypted meanin...

2015
Aggelos Kiayias Thomas Zacharias Bingsheng Zhang

We present the cryptographic implementation of “DEMOS”, a new e-voting system that is endto-end verifiable in the standard model, i.e., without any additional “setup” assumption or access to a random oracle (RO). Previously known end-to-end verifiable e-voting systems required such additional assumptions (specifically, either the existence of a “randomness beacon” or were only shown secure in t...

Journal: :I. J. Network Security 2016
Qiao Peng Youliang Tian

Using multiple linear of multilinear map, we propose a simple, non-interactive and effective publicly verifiable secret sharing (PVSS) scheme based on multilinear DiffieHellman assumption (MDH). Up to now, the publicly verifiable of secret sharing is still an issue. In this paper, we set the sharing secret is a multiple linear pairing, we apply the multiple linear property of multilinear map fo...

Journal: :Future Internet 2023

Privacy and verifiability are crucial security requirements in e-voting systems combining them is considered to be a challenge given that they seem contradictory. On one hand, privacy means cast votes cannot traced the corresponding voters. other linkability of voters their requirement which has consequence voter able check vote election result. These two contradictory features can addressed by...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید