Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 228
11.
  • Generic Construction of Cho... Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
    Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru ... Topics in Cryptology – CT-RSA 2012
    Book Chapter
    Recenzirano

    In this paper, we present the first generic construction of a chosen-ciphertext (CCA) secure uni-directional proxy re-encryption (PRE) scheme. In particular, full CCA security (i.e., not relaxed CCA ...
Celotno besedilo
12.
  • Generic Construction of Ada... Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    HAYATA, Junichiro; ISHIZAKA, Masahito; SAKAI, Yusuke ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020/01/01, 2020-1-1, 20200101, Letnik: E103.A, Številka: 1
    Journal Article
    Recenzirano

    Public-key encryption with keyword search (PEKS) is a cryptographic primitive that allows us to search for particular keywords over ciphertexts without recovering plaintexts. By using PEKS in cloud ...
Celotno besedilo
Dostopno za: NUK, UL, UM
13.
  • Fault-Tolerant Aggregate Si... Fault-Tolerant Aggregate Signature Schemes against Bandwidth Consumption Attack
    YAMASHITA, Kyosuke; ISHII, Ryu; SAKAI, Yusuke ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 09/2023, Letnik: E106.A, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    A fault-tolerant aggregate signature (FT-AS) scheme is a variant of an aggregate signature scheme with the additional functionality to trace signers that create invalid signatures in case an ...
Celotno besedilo
Dostopno za: NUK, UL, UM
14.
  • Equivalence between Non-Mal... Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions
    HAYATA, Junichiro; KITAGAWA, Fuyuki; SAKAI, Yusuke ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2021/01/01, 2021-1-1, 20210101, Letnik: E104.A, Številka: 1
    Journal Article
    Recenzirano

    Replayable chosen ciphertext (RCCA) security was introduced by Canetti, Krawczyk, and Nielsen (CRYPTO'03) in order to handle an encryption scheme that is “non-malleable except tampering which ...
Celotno besedilo
Dostopno za: NUK, UL, UM
15.
  • Secure Grouping Protocol Us... Secure Grouping Protocol Using a Deck of Cards
    HASHIMOTO, Yuji; SHINAGAWA, Kazumasa; NUIDA, Koji ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 09/2018, Letnik: E101.A, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    We consider a problem, which we call secure grouping, of dividing a number of parties into some subsets (groups) in the following manner: Each party has to know the other members of his/her group, ...
Celotno besedilo
Dostopno za: NUK, UL, UM

PDF
16.
  • Self-Bilinear Map on Unknow... Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
    Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro ... Algorithmica, 12/2017, Letnik: 79, Številka: 4
    Journal Article
    Recenzirano

    A self-bilinear map is a bilinear map where the domain and target groups are identical. In this paper, we introduce a self-bilinear map with auxiliary information which is a weaker variant of a ...
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
17.
Celotno besedilo
18.
  • Proxy Re-Encryption That Su... Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts
    KAWAI, Yutaka; MATSUDA, Takahiro; HIRANO, Takato ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019/01/01, 2019-1-1, 20190101, Letnik: E102.A, Številka: 1
    Journal Article
    Recenzirano

    Homomorphic encryption (HE) is useful to analyze encrypted data without decrypting it. However, by using ordinary HE, a user who can decrypt a ciphertext that is generated by executing homomorphic ...
Celotno besedilo
Dostopno za: NUK, UL, UM
19.
  • REN-A.I.: A Video Game for ... REN-A.I.: A Video Game for AI Security Education Leveraging Episodic Memory
    Arai, Mine; Tejima, Koki; Yamada, Yuya ... IEEE access, 2024, Letnik: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Education in cybersecurity is crucial in the current society, and it will be extended into the artificial intelligence (AI) area, called AI security, in the near future. Although many video games for ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
20.
  • Model Inversion Attacks for... Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes
    HIDANO, Seira; MURAKAMI, Takao; KATSUMATA, Shuichi ... IEICE Transactions on Information and Systems, 11/2018, Letnik: E101.D, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    The number of IT services that use machine learning (ML) algorithms are continuously and rapidly growing, while many of them are used in practice to make some type of predictions from personal data. ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
1 2 3 4 5
zadetkov: 228

Nalaganje filtrov