Showing 1 - 20 results of 743 for search 'Uproxx~', query time: 4.45s Refine Results
  1. 1
  2. 2

    Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes by Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal

    Published 2021-01-01
    “…Abstract The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. …”
    Get full text
    Article
  3. 3
  4. 4

    Proxy-cryptocurrency payment system by Xiao-tong FU, Si CHEN, Ning ZHANG

    Published 2017-07-01
    “…The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history.In the system,public keys were used as the users’ accounts which guaranteed the anonymity in real transactions.However,all the transaction information was recorded in the block chain,it was a potential threat for users’ privacy which might leak the payment information.Moreover,to avoid double-spending,it was agreed that the transaction on the target block was valid only if another k blocks were generated after the target one.The long waiting time reduced the efficiency of the payment system.A model of payment system based on a proxy-cryptocurrency was proposed,and a solution based on blind signature techniques was proposed.The scheme introduced a proxy in the payment phase,by which transaction confirmation time could be reduced and the transaction efficiency could be improved.Meanwhile,the system implements better anonymity,namely as the privacy protection function.…”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    A Multicomponent Magnetic Proxy for Solar Activity by Harry P. Warren, Linton E. Floyd, Lisa A. Upton

    Published 2021-12-01
    “…Abstract We present a new, multicomponent magnetic proxy for solar activity derived from full disk magnetograms that can be used in the specification and forecasting of the Sun’s radiative output. …”
    Get full text
    Article
  8. 8

    Research on the programming language for proxy re-encryption by Mang SU, Yan YU, Bin WU, Anmin FU

    Published 2018-06-01
    Subjects: “…proxy re-encryption…”
    Get full text
    Article
  9. 9

    Accumulation of Deficits as a Proxy Measure of Aging by Arnold B. Mitnitski, Alexander J. Mogilner, Kenneth Rockwood

    Published 2001-01-01
    “…In consequence, we propose that it may be used as a proxy measure of aging.…”
    Get full text
    Article
  10. 10

    Time-and-ID-Based Proxy Reencryption Scheme by Kambombo Mtonga, Anand Paul, Seungmin Rho

    Published 2014-01-01
    “…Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. …”
    Get full text
    Article
  11. 11
  12. 12

    Attacks on One Designated Verifier Proxy Signature Scheme by Baoyuan Kang

    Published 2012-01-01
    “…In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. …”
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Proxy re-signature scheme based on isomorphisms of polynomial by Hui-xian LI, Lu SHAO, Liao-jun PANG

    Published 2017-02-01
    Subjects: “…proxy re-signature…”
    Get full text
    Article
  17. 17

    A Comparison of Auroral Oval Proxies With the Boundaries of the Auroral Electrojets by Simon James Walker, Karl Magnus Laundal, Jone Peter Reistad, Anders Ohma, Spencer Mark Hatch, Gareth Chisham, Margot Decotte

    Published 2024-04-01
    “…Using statistics and conjunction events we compare our electrojet boundary data set with an existing electrojet boundary data set, based on Swarm satellite measurements, and auroral oval proxies based on particle precipitation and field‐aligned currents. …”
    Get full text
    Article
  18. 18
  19. 19

    Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme by Huixian Li, Liaojun Pang

    Published 2016-05-01
    “…Ciphertext-Policy Attribute-Based Proxy Reencryption (CP-ABPRE) has found many practical applications in the real world, because it extends the traditional Proxy Reencryption (PRE) and allows a semitrusted proxy to transform a ciphertext under an access policy to the one with the same plaintext under another access policy. …”
    Get full text
    Article
  20. 20