نتایج جستجو برای: واژگان کلیدی ibe
تعداد نتایج: 50206 فیلتر نتایج به سال:
Identity-based encryption (also known as IBE) is a type of public key cryptography in which the public key of a user is some unique information about his identity. The initial motivation to the creation of IBE was to simplify key management in email systems. An open problem was the creation of a space-efficient IBE scheme that was not based in pairings on elliptic curves. Boneh, Gentry and Hamb...
BACKGROUND With the incidence of breast cancer rising worldwide, we are evaluating the iBreastExam (iBE) (UE LifeSciences Inc.), a handheld breast scanning device that can be utilized by community health workers to screen for breast abnormalities. The purpose of this study is to determine the sensitivity of the iBE in a population undergoing diagnostic breast imaging. METHODS Adult patients p...
Waters, in 2009, introduced an important technique, called dual-system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters has removed the tags and proceeding th...
The aim of this thesis is to find a way to undermine the indispensability argument for mathematical platonism. In chapter 1 I provide a brief survey of the indispensability argument, arguing that the explanatory indispensability argument is stronger than earlier forms of the argument. This is because it has less controversial premises, appealing neither to confirmational holism nor to a strong ...
Statistical criterion for evaluation of individual bioequivalence (IBE) between generic and innovative products often involves a function of the second moments of normal distributions. Under replicated crossover designs, the aggregate criterion for IBE proposed by the guidance of the U.S. Food and Drug Administration (FDA) contains the squared mean difference, variance of subject-by-formulation...
Hibernation in 13-lined ground squirrels (Ictidomys tridecemlineatus) is associated with a substantial suppression of whole-animal metabolism. We compared the metabolism of liver mitochondria isolated from torpid ground squirrels with those from interbout euthermic (IBE; recently aroused from torpor) and summer euthermic conspecifics. Succinate-fuelled state 3 respiration, calculated relative t...
Identity-based encryption (IBE) schemes are usually used in multiplePKG environments — on the one hand, each administrative domain (e.g., a relatively small and close organization) maintains its own private key generator (PKG); on the other hand, encryption across domains becomes a prevalent requirement. In this paper, we present a new IBE scheme using bilinear pairings. Compared with the famou...
In recent years, as more generic drug products become available, it is a concern not only whether generic drug products that have been approved based on the regulation of average bioequivalence will have the same quality, safety and efficacy as that of the brand-name drug product, but also whether the approved generic drug products can be used interchangeably. In its recent draft guidance, the ...
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted by hacking or the period of a contract expires. In the public key infrastructure setting, numerous solutions have been proposed, and in the Identity Based Encryption (IBE) setting, a recent series of papers proposed revocable IBE schemes. Delegation of key generation is also an important functio...
We present an Identity Based Encryption (IBE) system that is fully secure in the standard model and has several advantages over previous such systems – namely, computational efficiency, shorter public parameters, and a “tight” security reduction, albeit to a stronger assumption that depends on the number of private key generation queries made by the adversary. Our assumption is a variant of Bon...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید