搜索结果: 1-15 共查到“aggregate”相关记录158条 . 查询时间(0.109 秒)
中国科学院宁波材料技术与工程研究所在Aggregate上发表邀请综述“聚集诱导发光高分子水凝胶”(图)
诱导发光 高分子 水凝胶
font style='font-size:12px;'>
2021/4/7
智能荧光高分子水凝胶是一类发光性能可调的高分子软材料。三维聚合物交联网络中包含大量溶剂水分子的独特结构特点,使得其不仅可兼具经典荧光高分子水溶液和固态本体材料两者共同的性能优势,还常具有一些优异的新性能,例如与生物组织相近的模量、固有的软湿特性、良好的生物相容性、以及刺激响应多功能(体积、模量、荧光等)协同变化特性等,因而在生物医用、传感检测、仿生驱动、软体机器人等领域拥有巨大应用前景,是先进发光...
Fast Authentication from Aggregate Signatures with Improved Security
Authentication Digital signatures Universal forgery
font style='font-size:12px;'>
2018/11/30
An attempt to derive signer-efficient digital signatures from aggregate signatures was made in a signature scheme referred to as Structure-free Compact Rapid Authentication (SCRA) (IEEE TIFS 2017). In...
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble
Mimblewimble Bitcoin commitments
font style='font-size:12px;'>
2018/11/2
Mimblewimble is an electronic cash system proposed by an anonymous author in 2016. It combines several privacy-enhancing techniques initially envisioned for Bitcoin, such as Confidential Transactions ...
Non-adaptive Group-Testing Aggregate MAC Scheme
message authentication aggregate group testing
font style='font-size:12px;'>
2018/5/22
This paper applies non-adaptive group testing to aggregate message authentication code (MAC) and introduces non-adaptive group-testing aggregate MAC. After formalization of its syntax and security req...
Synchronized Aggregate Signatures from the RSA Assumption
signatures aggregate RSA
font style='font-size:12px;'>
2018/1/25
In this work we construct efficient aggregate signatures from the RSA assumption in the synchronized setting. In this setting, the signing algorithm takes as input a (time) period tt as well the secre...
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures
Aggregate signatures trapdoor permutations ideal cipher model
font style='font-size:12px;'>
2018/1/19
We give a framework for trapdoor-permutation-based sequential aggregate signatures (SAS) that unifies and simplifies prior work and leads to new results. The framework is based on ideal ciphers over l...
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
Sequential Aggregate Signatures Fault-Tolerance Secure Logging
font style='font-size:12px;'>
2017/9/28
Keeping correct and informative log files is crucial for system maintenance, security and forensics. Cryptographic logging schemes offer integrity checks that protect a log file even in the case where...
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions
intersection-sum Attributing Aggregate Ad Conversions
font style='font-size:12px;'>
2017/8/2
In this work, we consider the Intersection-Sum problem: two parties hold datasets containing user identifiers, and the second party additionally has an integer value associated with each user identifi...
Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
Searchable Encryption Access Control Data Privacy
font style='font-size:12px;'>
2017/4/17
Fine-grained access control, especially in shared data environments such as the cloud, is a common scenario. Suppose a data owner encrypts and stores a collection of NN documents in the cloud, and wis...
A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes
Identity-based Signatures Sequential Aggregate Signatures the CDH Assumption
font style='font-size:12px;'>
2017/4/12
Identity-based sequential aggregate signature (IBSAS) schemes are usually applied to secure network routing and sensor networks, since they allow multiple signers to sequentially produce a short signa...
Cryptanalysis of a certificateless aggregate signature scheme
public-key cryptography C4I
font style='font-size:12px;'>
2016/12/26
Recently, Nie et al. proposed a certificateless aggregate signature scheme. In the standard security model considered in certificateless cryptography, we are dealing with two types of adversaries. In ...
Evaluating the Human Damage of Tsunami at Each Time Frame in Aggregate Units Based on GPS data
GIS The Nankai trough megathrust earthquake Evacuation Casualties Population distribution
font style='font-size:12px;'>
2016/11/30
Assessments of the human damage caused by the tsunami are required in order to consider disaster prevention at such a regional level. Hence, there is an increasing need for the assessments of human da...
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
conditional privacy-preserving vehicular sensor networks
font style='font-size:12px;'>
2016/7/15
Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J. Horng et al., An efficient certificatele...
Identity-Based Key Aggregate Cryptosystem from Multilinear Maps
Key-Aggregate Cryptosystem Identity-based Online Data Sharing
font style='font-size:12px;'>
2016/7/14
The key-aggregate cryptosystem (KAC) proposed by Chu et al. in 2014 offers a solution
to the flexible access delegation problem in shared data environments such as the cloud.
KAC allows a data owner...
MQSAS - A Multivariate Sequential Aggregate Signature Scheme
Multivariate Cryptography HFEv- Sequential Aggregate Signatures
font style='font-size:12px;'>
2016/5/24
(Sequential) Aggregate signature schemes enable a group of users u1,…,uk with messages m1,…,mk to produce a single signature Σ which states the integrity and authenticity of all the messages m1,…,mk. ...