Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 228
21.
  • Shortening the Libert-Peter... Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology
    OHARA, Kazuma; EMURA, Keita; HANAOKA, Goichiro ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 09/2019, Letnik: E102.A, Številka: 9
    Journal Article
    Recenzirano

    At EUROCRYPT 2012, Libert, Peters and Yung (LPY) proposed the first scalable revocable group signature (R-GS) scheme in the standard model which achieves constant signing/verification costs and other ...
Celotno besedilo
Dostopno za: NUK, UL, UM
22.
  • Simulation-based receiver s... Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
    Hara, Keisuke; Kitagawa, Fuyuki; Matsuda, Takahiro ... Theoretical computer science, 11/2019, Letnik: 795
    Journal Article
    Recenzirano
    Odprti dostop

    In the situation where there are one sender and multiple receivers and the sender transmits ciphertexts of correlated plaintexts, a receiver selective opening (RSO) attack for a public key encryption ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
23.
  • Aggregate Signature Schemes... Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures
    ISHII, Ryu; YAMASHITA, Kyosuke; SAKAI, Yusuke ... IEICE Transactions on Information and Systems, 11/2022, Letnik: E105.D, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Aggregate signature schemes enable us to aggregate multiple signatures into a single short signature. One of its typical applications is sensor networks, where a large number of users and devices ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
24.
  • Toward Finite-Runtime Card-... Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points
    HASHIMOTO, Yuji; NUIDA, Koji; SHINAGAWA, Kazumasa ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 09/2018, Letnik: E101.A, Številka: 9
    Journal Article
    Recenzirano

    In the research area of card-based secure computation, one of the long-standing open problems is a problem proposed by Crépeau and Kilian at CRYPTO 1993. This is to develop an efficient protocol ...
Celotno besedilo
Dostopno za: NUK, UL, UM
25.
  • How to Extend CTRT for AES-... How to Extend CTRT for AES-256 and AES-192
    SHIN, SeongHan; YAMADA, Shota; HANAOKA, Goichiro ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 08/2022, Letnik: E105.A, Številka: 8
    Journal Article
    Recenzirano

    AONT (All-or-Nothing Transform) is a kind of (n, n)-threshold secret sharing scheme that distributes a message m into a set of n shares such that the message m can be reconstructed if and only if n ...
Celotno besedilo
Dostopno za: NUK, UL, UM
26.
Celotno besedilo

PDF
27.
  • Tag-KEM/DEM Framework for P... Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening
    SAKAI, Yusuke; MATSUDA, Takahiro; HANAOKA, Goichiro IEICE Transactions on Information and Systems, 11/2018, Letnik: E101.D, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    In a large-scale information-sharing platform, such as a cloud storage, it is often required to not only securely protect sensitive information but also recover it in a reliable manner. Public-key ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
28.
  • Convertible Nominative Sign... Convertible Nominative Signatures from Standard Assumptions without Random Oracles
    HANAOKA, Goichiro; SCHULDT, Jacob IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 06/2016, Letnik: E99.A, Številka: 6
    Journal Article
    Recenzirano

    While standard signatures provide an efficient mechanism for information certification, the lack of privacy protecting measures makes them unsuitable if sensitive or confidential information is being ...
Celotno besedilo
Dostopno za: NUK, UL, UM
29.
  • Multi-Input Functional Encr... Multi-Input Functional Encryption with Controlled Decryption
    ATTRAPADUNG, Nuttapong; HANAOKA, Goichiro; HIRANO, Takato ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 07/2021, Letnik: E104.A, Številka: 7
    Journal Article
    Recenzirano

    In this paper, we put forward the notion of a token-based multi-input functional encryption (token-based MIFE) scheme - a notion intended to give encryptors a mechanism to control the decryption of ...
Celotno besedilo
Dostopno za: NUK, UL, UM
30.
  • Efficient Secure Neural Net... Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation
    NISHIDA, Naohisa; OBA, Tatsumi; UNAGAMI, Yuji ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 12/2020, Letnik: E103.A, Številka: 12
    Journal Article
    Recenzirano

    Machine learning models inherently memorize significant amounts of information, and thus hiding not only prediction processes but also trained models, i.e., model obliviousness, is desirable in the ...
Celotno besedilo
Dostopno za: NUK, UL, UM
1 2 3 4 5
zadetkov: 228

Nalaganje filtrov