نتایج جستجو برای: ABE
تعداد نتایج: 1907 فیلتر نتایج به سال:
We show a generic conversion that converts an attribute based encryption (ABE)scheme for arbitrary predicate into an ABE scheme for its dual predicate. In particular, itcan convert key-policy ABE (KP-ABE) into ciphertext-policy ABE (CP-ABE), and viceversa, for dually related predicates. It is generic in the sense that it can be applied toarbitrary predicates. On the other ha...
the study of nucleation mechanism of new grains during severe plastic deformation of magnesium alloys is of great importance to control the characteristics of final microstructures. to investigate the role of discontinuous recrystallization, a wrought az31 magnesium alloy was deformed by accumulative back extrusion process at 330 °c. the obtained microstructures were studied using optical and...
Predicate encryption is an advanced form of public-key encryption that yield high flexibility in terms of access control. In the literature, many predicate encryption schemes have been proposed such as fuzzy-IBE, KP-ABE, CPABE, (doubly) spatial encryption (DSE), and ABE for arithmetic span programs. In this paper, we study relations among them and show that some of them are in fact equivalent b...
In this paper, we introduce a new cryptographic primitive, called adaptable ciphertext-policy attribute-based encryption (CP-ABE). Adaptable CP-ABE extends the traditional CP-ABE by allowing a semitrusted proxy to modify a ciphertext under one access policy into ciphertexts of the same plaintext under any other access policies; the proxy, however, learns nothing about the underlying plaintext. ...
Predicate encryption is an advanced form of public-key encryption that yield high flexibility in terms of access control. In the literature, many predicate encryption schemes have been proposed such as fuzzy-IBE, KP-ABE, CP-ABE, (doubly) spatial encryption (DSE), and ABE for arithmetic span programs. In this paper, we study relations among them and show that some of them are in fact equivalent ...
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user's secret key. It is an efficient way to solve open problems in access control scenarios, for example, how ...
As a recently proposed public key primitive, attribute-based encryption (ABE) (including Ciphertext-policy ABE (CP-ABE) and Key-policy ABE (KP-ABE)) is a highly promising tool for secure fine-grained access control. For the purpose of secure access control, there is, however, still one critical functionality missing in the existing ABE schemes, which is the prevention of key abuse. In particula...
دراین تحقیق یک مدل ارزیابی رضایت مشتریان برای شرکت های آب و فاضلاب ارایه شده است و شرکت آب و فاضلاب استان همدان، به عنوان مطالعه موردی مورد استفاده قرار گرفته است. بدین منظور ابتدا شاخص های موثر بر رضایت مشتریان با مرور تحقیقات پیشین و مصاحبه با کارشناسان شرکت آب و فاضلاب تعیین شده است. پس از تعیین شاخص های موثر در رضایت مشتریان در شرکت آب و فاضلاب استان همدان شامل کیفیت آب، کمیت آب،عوامل مرتبط...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید