نتایج جستجو برای: private key search

تعداد نتایج: 913761  

2008
Giuseppe Ateniese Karyn Benson Susan Hohenberger

Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very least, the proxy should not be able to learn the keys of the participants or the content of the ...

Journal: :IACR Cryptology ePrint Archive 2017
Wutichai Chongchitmate Rafail Ostrovsky

Multi-key fully homomorphic encryption (MFHE) schemes allow polynomially many users without trusted setup assumptions to send their data (encrypted under different FHE keys chosen by users independently of each other) to an honest-but-curious server that can compute the output of an arbitrary polynomial-time computable function on this joint data and issue it back to all participating users for...

Journal: :IACR Cryptology ePrint Archive 2016
Sergi Delgado-Segura Cristina Pérez-Solà Jordi Herrera-Joancomartí Guillermo Navarro-Arribas

Bitcoin smart contracts allow the development of new protocols on top of Bitcoin itself. This usually involves the definition of complex scripts, far beyond the requirement of a single signature. In this paper we introduce the concept of private key locked transactions, a novel type of transactions that allows the atomic verification of a given private key (belonging to an asymmetric key pair) ...

2011
Naveed Ahmed Christian D. Jensen Erik Zenner

Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security analysis aiming at the automated verification of network protocols. The näıve use of symbolic encryption, however, may unnecessarily require an expensive construction: an arbitrary-length encryption scheme that is private and non-malleable in an adaptive CCACPA setting. Most of the time, such assumptions rem...

Journal: :J. Inf. Sci. Eng. 2008
Jeong-Beom Kim MoonBae Song Chong-Sun Hwang SangKeun Lee

As a de facto standard protocol, Internet protocol security (IPSec) provides secure communication between networked systems. One of the most common issues today in large-scale virtual private networks using IPSec is the problem of a stale security association, which occurs when the device at one end of the tunnel maintains the tunnel state but the other end does not. Internet key exchange (IKE)...

Journal: :Identity in the Information Society 2009

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1393

abstract listening is a key and main tool in second language skill and its development is of prime concern to teachers and learners. furthermore, the application of technology in language classrooms has become more commonplace in the last fifty years. computer and the internet have made foreign language materials easy to access and use. so, the present study is an attempt to examine the effec...

Rezayatmand, Mohammad Reza , Etemadi , Ghazaal , Shaarbafchizadeh , Nasrin ,

Objective: Public-private partnerships (PPP) have been used recently in many countries for reforming the structural health sector. The purpose of this study was to investigate the impact of PPP models in hospitals on raising the awareness of health policy makers, managers, and authorities to make sound decisions and planning. Information sources and selection methods for the study: This review...

Journal: :IEEE Transactions on Information Theory 2020

Journal: :Journal of Internet Services and Applications 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید