نتایج جستجو برای: proxy model
تعداد نتایج: 2124051 فیلتر نتایج به سال:
Summary A physics-based data-driven model is proposed for forecasting of subsurface energy production. The fully relies on production data and does not require any in-depth knowledge reservoir geology or governing physics. In the approach, we use Delft Advanced Reservoir Terra Simulator (DARTS) as a workhorse simulation. DARTS uses an operator-based linearization technique that exploits abstrac...
As a signing capability delegation technique, multi-proxy signature allows all signers in the delegated group to produce jointly a multi-proxy signature on the behalf of an original signer, and has been widely applied in distributed computing. Currently, most of multi-proxy signature schemes in the standard model cannot achieve strong unforgeablity, lightweight computation and short length of m...
To optimize the multimedia proxy server effectively, this paper proposes a gain-based cache replacement policy by using the multimedia proxy server gain model. The performance of the proposed gain-based policy is evaluated by simulation experiments.
In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Identity Based Encryption)(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4). We observe that...
In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for ...
This paper proposes a novel ID-based aggregate proxy signature scheme that realizes a warrant-based delegation for an original signer to transfer his/her signing power to a given set of proxy signers. Our proposed scheme allows n distinct proxy signers to sign n distinct messages in such a way that these n individual signatures can be aggregated into a single one without expansion. In the pract...
Background Many of public hospitals in Japan have had a deficit for a long time. Japanese local governments have been encouraging public hospitals to use group purchasing of drugs to benefit from the economies of scale, and increase their bargaining power for obtaining discounts in drug purchasing, thus improving their financial situation. In this study, we empirically investigate whether or no...
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. In this paper, by using signature of knowledge and Fijisaki-Okamoto con...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید