نتایج جستجو برای: واژگان کلیدی ibe

تعداد نتایج: 50206  

2013
Michael Clear Arthur Hughes Hitesh Tewari

A characterization of predicate encryption (PE) with support for homomorphic operations is presented and we describe the homomorphic properties of some existing PE constructions. Even for the special case of IBE, there are few known group-homomorphic cryptosystems. Our main construction is an XOR-homomorphic IBE scheme based on the quadratic residuosity problem (variant of the Cocks’ scheme), w...

2010
Alex David Hatch

The following essay was written by Mr. Alex Hatch, a junior undergraduate student majoring in Biological Engineering at Utah State University. Mr. Hatch submitted a 1000-1200 word essay to the 5th Annual Bioethics Contest sponsored by the Institute of Biological Engineering (IBE). A group of professionals in Biological Engineering assessed and ranked the essays in a blinded process. Five semi-f...

2007
Toshihiko Matsuo

A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different ciphertexts that can be decrypted by Bob’s secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional certificate-based public key into the ciphertexts that can be decrypted by an secret...

Journal: :IACR Cryptology ePrint Archive 2013
Zhengjun Cao Lihua Liu

In 2009, Seo et al. proposed an anonymous hierarchical identity-based encryption (IBE). The ciphertext consists of (C1, C2, C3, C4), where C1 is the blinded message, C4 is the blinded identity, both C2 and C3 are used as decrypting helpers. To prove its security, the authors defined five games and introduced a strong simulator who is able to select different Setups for those games. In this pape...

Journal: :Synthese 2013
Gregor Betz

This article discusses how inference to the best explanation (IBE) can be justified as a practical meta-argument. It is, firstly, justified as a practical argument insofar as accepting the best explanation as true can be shown to further a specific aim. And because this aim is a discursive one which proponents can rationally pursue in—and relative to—a complex controversy, namely maximising the...

Journal: :Religious Studies 2021

Abstract Relying on inference to the best explanation (IBE) requires one hold intuition that world is ‘intelligible’, is, such states of affairs at least generally have explanations for their obtaining. I argue metaphysical naturalists are rationally required withhold this intuition, unless they cease be naturalists. This because all plausible naturalistic aetiologies entail and state which it ...

یکی از مباحث جدید در علوم قرآنی،زبان‌شناسی تخصصی قرآن است که امروزه‌ شاخه‌ای مهم از اسلوب‌های فهم قرآن شمرده می‌شود.یکی از شعبه‌های زبان‌شناسی نیز معنی‌شناسی است که در آن به بررسی واژگان کلیدی قرآن می‌پردازند،منظور از واژگان‌ کلیدی آن دسته از مفرداتی هستند که اگر با روشی میدانی ارزیابی معنایی شوند می‌توانند در تفسیر آیه و وجوه معنایی آن نقش بالایی داشته باشند.در این مقاله با توجه به شاخهء معناش...

چکیده: در زمینه تربیت، روش های گوناگونی وجود دارد. یکی از مداخلات تربیتی غیر مستقیم، «تغافل» است که تا کنون کمتر معیارهایی برای تعیین شرایط مناسب و حدود و ثغور به کار گیری آن ارائه شده و در دسترس مربیان قرار گرفته است. هدف از انجام این پژوهش، شناسایی مبانی انسان شناختی و اصول تربیتی زیربنایی «روش تغافل»، بررسی شرایط، حدود و ثغور و موارد کاربرد یا ممنوعیت کاربرد روش تربیتی تغافل است. روش پژوهش،‌...

2006
Himanshu Khurana Jim Basney

Identity-based encryption (IBE) techniques promise to solve the key distribution problem for secure email. We argue that before this technology is adopted for the important application of secure email it needs to be critically examined in terms of its benefits and risks. To that end our analysis summarizes the unique benefits of IBE and also the significant assumptions and limitations behind it...

2015
Shantian Cheng Juanyang Zhang

In view of the expiration or reveal of user’s private credential (or private key) in a realistic scenario, identity-based encryption (IBE) schemes with an efficient key revocation mechanism, or for short, revocable identity-based encryption (RIBE) schemes, become prominently significant. In this paper, we present an RIBE scheme from lattices by combining two Agrawal et al.’s IBE schemes with th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید