نتایج جستجو برای: asymmetric verifiability
تعداد نتایج: 66461 فیلتر نتایج به سال:
Attribute-based encryption (ABE) is a standard encryption that allows users to encrypt and decrypt data based on user attributes. I t is extension o f attribute set based encryption to improve scalability and flexibility w hile at the same time Inherits the feature of fine grained access control of ABE.It is flexible access control of encrypted data stored in the cloud. It is using access polic...
Code voting seeks to address the issues of privacy and integrity for Remote Internet Voting. It sidesteps many of the inherent vulnerabilities of the Internet and client platforms but it does not provide end-to-end verification that votes are counted as cast. In this paper, we propose a simple technique to enhance the verifiability of code voting by ensuring that the Vote Server can only access...
Unified Modeling Language (UML) is the Object Management Group (OMG) standard notation for object-oriented modeling. UML activity diagram (AD) are widely used to workflow and system flow in system analysis. However, activity diagram lacks support for simulation, dynamic semantics limits and verifiability capabilities. APN are a popular technique for modeling the control flow dimension of workfl...
Most embedded systems for the avionics industry are considered safety critical systems; as a result, strict software development standards exist to ensure critical software is built with the highest quality possible. One of such standards, DO-178B, establishes a number of properties that software requirements must satisfy including: accuracy, non-ambiguity and verifiability. From a language per...
Prêt à Voter is one of the most well-known and most extensively analysed electronic voting systems for polling stations. However, an analysis from a legal point of view has not yet been conducted. The purpose of this paper is to analyse the readiness of Prêt à Voter for legally binding federal elections in Germany. This case is of particular interest as Germany has with the Constitutional Court...
Inside a dispersed foriegn atmosphere, anyone receives a untrusted company which has a change for better crucial allowing this foriegn to turn any kind of ABE ciphertext fulfilled through the wearer's features. Stability of ABE technique with outsourced decryption makes certain that a foe (including any destructive cloud) aren't going to be capable to study everything about the encrypted meanin...
We present the cryptographic implementation of “DEMOS”, a new e-voting system that is endto-end verifiable in the standard model, i.e., without any additional “setup” assumption or access to a random oracle (RO). Previously known end-to-end verifiable e-voting systems required such additional assumptions (specifically, either the existence of a “randomness beacon” or were only shown secure in t...
Using multiple linear of multilinear map, we propose a simple, non-interactive and effective publicly verifiable secret sharing (PVSS) scheme based on multilinear DiffieHellman assumption (MDH). Up to now, the publicly verifiable of secret sharing is still an issue. In this paper, we set the sharing secret is a multiple linear pairing, we apply the multiple linear property of multilinear map fo...
Privacy and verifiability are crucial security requirements in e-voting systems combining them is considered to be a challenge given that they seem contradictory. On one hand, privacy means cast votes cannot traced the corresponding voters. other linkability of voters their requirement which has consequence voter able check vote election result. These two contradictory features can addressed by...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید