搜索结果: 1-11 共查到“军事学 Group-based”相关记录11条 . 查询时间(0.187 秒)
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers
Unlinkability Privacy Advertising
2019/4/11
Online Social Networks (OSNs) offer free storage and social networking services through which users can communicate personal information with one another. The personal information of the users collect...
The Distinction Between Fixed and Random Generators in Group-Based Assumptions
Diffie-Hellman preprocessing point obfuscation
2019/3/1
There is surprisingly little consensus on the precise role of the generator g in group-based assumptions such as DDH. Some works consider g to be a fixed part of the group description, while others ta...
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks
Advertising Online Social Networks Privacy-Preserving Advertising
2018/4/10
Services provided as free by Online Social Networks (OSN) come with privacy concerns. Users' information kept by OSN providers are vulnerable to the risk of being sold to the advertising firms. To pro...
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication
Group-based Secure Communication Ciphertext-Policy Attribute-Based Encryption ID Revocation
2017/11/20
Ciphertext-Policy Attribute-Based Encryp- tion (CP-ABE) is an access control mechanism over encrypted data and well suited for secure group-based communication. However, it also suffers from the fol- ...
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
secure computation homomorphic secret sharing share conversion
2017/2/23
A recent work of Boyle et al. (Crypto 2016) suggests that ``group-based'' cryptographic protocols, namely ones that only rely on a cryptographically hard (Abelian) group, can be surprisingly powerful....
On the Security of Group-based Proxy Re-encryption Scheme
Public-key Cryptography Proxy Re-encryption
2014/3/11
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext intended for Alice into a ciphertext for Bob without learning anything about the underlying plaintext. Chunbo Ma et al. ha...
Revisit of Group-based Unidirectional Proxy Re-encryption Scheme
Unidirectional Group-based Proxy
2009/6/5
Currently, researchers have focused their attention on proxy re-encryption scheme deployed between two entities. Lots of bidirectional schemes have been proposed and this kind of scheme is suitable fo...
Towards a Uniform Description of Several Group Based Cryptographic Primitives
Uniform Description Several Group Cryptographic Primitives
2009/4/14
The public key cryptosystems MST1 and MST2 make use of certain
kinds of factorizations of finite groups. We show that generalizing such
factorizations to infinite groups allows a uniform description...
Assessing security of some group based cryptosystems
Assessing security group cryptosystems
2009/4/9
Assessing security of some group based cryptosystems.
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
Length-Based Attacks Certain Group Encryption Rewriting Systems
2009/4/9
In this note, we describe a probabilistic attack on public key cryptosystems based on the word/conjugacy
problems for finitely presented groups of the type proposed recently by Anshel, Anshel and Gol...
Recently, proxy re-encryption scheme received much attention. In this paper, we
propose a proxy re-encryption used for divert ciphertext from one group to another. The scheme is bidirectional and any...