نتایج جستجو برای: ABE

تعداد نتایج: 1907  

Abe

Journal: :The Vernal Pool 2019

Journal: :IACR Cryptology ePrint Archive 2015
Nuttapong Attrapadung Shota Yamada

We show a generic conversion that converts an attribute based encryption (ABE)scheme for arbitrary predicate into an ABE scheme for its dual predicate. In particular, itcan convert key-policy ABE (KP-ABE) into ciphertext-policy ABE (CP-ABE), and viceversa, for dually related predicates. It is generic in the sense that it can be applied toarbitrary predicates. On the other ha...

Journal: :journal of ultrafine grained and nanostructured materials 2013
s.m. fatemi-varzaneh a. zarei-hanzaki r. vaghar

the study of nucleation mechanism of new grains during severe plastic deformation of magnesium alloys is of great importance to control the characteristics of final microstructures.  to investigate the role of discontinuous recrystallization, a wrought az31 magnesium alloy was deformed by accumulative back extrusion process at 330 °c.  the obtained microstructures were studied using optical and...

Journal: :IACR Cryptology ePrint Archive 2015
Shota Yamada Nuttapong Attrapadung Goichiro Hanaoka

Predicate encryption is an advanced form of public-key encryption that yield high flexibility in terms of access control. In the literature, many predicate encryption schemes have been proposed such as fuzzy-IBE, KP-ABE, CPABE, (doubly) spatial encryption (DSE), and ABE for arithmetic span programs. In this paper, we study relations among them and show that some of them are in fact equivalent b...

2013
Junzuo Lai Robert H. Deng Yanjiang Yang Jian Weng

In this paper, we introduce a new cryptographic primitive, called adaptable ciphertext-policy attribute-based encryption (CP-ABE). Adaptable CP-ABE extends the traditional CP-ABE by allowing a semitrusted proxy to modify a ciphertext under one access policy into ciphertexts of the same plaintext under any other access policies; the proxy, however, learns nothing about the underlying plaintext. ...

2015
Nuttapong Attrapadung Goichiro Hanaoka Shota Yamada

Predicate encryption is an advanced form of public-key encryption that yield high flexibility in terms of access control. In the literature, many predicate encryption schemes have been proposed such as fuzzy-IBE, KP-ABE, CP-ABE, (doubly) spatial encryption (DSE), and ABE for arithmetic span programs. In this paper, we study relations among them and show that some of them are in fact equivalent ...

Journal: :Psychiatric Bulletin 1993

2014
Liaojun Pang Jie Yang Zhengtao Jiang

With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user's secret key. It is an efficient way to solve open problems in access control scenarios, for example, how ...

Journal: :IACR Cryptology ePrint Archive 2009
Jin Li Kui Ren Kwangjo Kim

As a recently proposed public key primitive, attribute-based encryption (ABE) (including Ciphertext-policy ABE (CP-ABE) and Key-policy ABE (KP-ABE)) is a highly promising tool for secure fine-grained access control. For the purpose of secure access control, there is, however, still one critical functionality missing in the existing ABE schemes, which is the prevention of key abuse. In particula...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده مهندسی صنایع 1389

دراین تحقیق یک مدل ارزیابی رضایت مشتریان برای شرکت های آب و فاضلاب ارایه شده است و شرکت آب و فاضلاب استان همدان، به عنوان مطالعه موردی مورد استفاده قرار گرفته است. بدین منظور ابتدا شاخص های موثر بر رضایت مشتریان با مرور تحقیقات پیشین و مصاحبه با کارشناسان شرکت آب و فاضلاب تعیین شده است. پس از تعیین شاخص های موثر در رضایت مشتریان در شرکت آب و فاضلاب استان همدان شامل کیفیت آب، کمیت آب،عوامل مرتبط...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید