-
1
Design and implementation of proxy-protected proxy signature based on SM2
Published 2017-09-01Subjects: Get full text
Article -
2
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01“…Abstract The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. …”
Get full text
Article -
3
Uprooting Without Proletarianization in the Paraguayan Agricultural Sector
Published 2019-01-01Subjects: Get full text
Article -
4
Proxy-cryptocurrency payment system
Published 2017-07-01“…The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history.In the system,public keys were used as the users’ accounts which guaranteed the anonymity in real transactions.However,all the transaction information was recorded in the block chain,it was a potential threat for users’ privacy which might leak the payment information.Moreover,to avoid double-spending,it was agreed that the transaction on the target block was valid only if another k blocks were generated after the target one.The long waiting time reduced the efficiency of the payment system.A model of payment system based on a proxy-cryptocurrency was proposed,and a solution based on blind signature techniques was proposed.The scheme introduced a proxy in the payment phase,by which transaction confirmation time could be reduced and the transaction efficiency could be improved.Meanwhile,the system implements better anonymity,namely as the privacy protection function.…”
Get full text
Article -
5
-
6
Provably secure and efficient proxy signature scheme
Published 2014-08-01Subjects: Get full text
Article -
7
A Multicomponent Magnetic Proxy for Solar Activity
Published 2021-12-01“…Abstract We present a new, multicomponent magnetic proxy for solar activity derived from full disk magnetograms that can be used in the specification and forecasting of the Sun’s radiative output. …”
Get full text
Article -
8
Research on the programming language for proxy re-encryption
Published 2018-06-01Subjects: “…proxy re-encryption…”
Get full text
Article -
9
Accumulation of Deficits as a Proxy Measure of Aging
Published 2001-01-01“…In consequence, we propose that it may be used as a proxy measure of aging.…”
Get full text
Article -
10
Time-and-ID-Based Proxy Reencryption Scheme
Published 2014-01-01“…Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. …”
Get full text
Article -
11
Research and implementation of fuzzing testing based on HTTP proxy
Published 2016-02-01Subjects: Get full text
Article -
12
Attacks on One Designated Verifier Proxy Signature Scheme
Published 2012-01-01“…In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. …”
Get full text
Article -
13
Probabilistic Solar Proxy Forecasting With Neural Network Ensembles
Published 2023-09-01Subjects: Get full text
Article -
14
Privacy matching-based service proxy discovery scheme
Published 2016-08-01Subjects: “…proxy…”
Get full text
Article -
15
Innovation by proxy – clusters as ecosystems facilitating open innovation
Published 2020-01-01Get full text
Article -
16
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01Subjects: “…proxy re-signature…”
Get full text
Article -
17
A Comparison of Auroral Oval Proxies With the Boundaries of the Auroral Electrojets
Published 2024-04-01“…Using statistics and conjunction events we compare our electrojet boundary data set with an existing electrojet boundary data set, based on Swarm satellite measurements, and auroral oval proxies based on particle precipitation and field‐aligned currents. …”
Get full text
Article -
18
Attribute-based proxy re-encryption scheme with multiple features
Published 2019-06-01Subjects: Get full text
Article -
19
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme
Published 2016-05-01“…Ciphertext-Policy Attribute-Based Proxy Reencryption (CP-ABPRE) has found many practical applications in the real world, because it extends the traditional Proxy Reencryption (PRE) and allows a semitrusted proxy to transform a ciphertext under an access policy to the one with the same plaintext under another access policy. …”
Get full text
Article -
20
Provably secure certificate less blind proxy re-signatures
Published 2012-09-01Subjects: Get full text
Article