搜索结果: 1-15 共查到“Equality”相关记录61条 . 查询时间(0.171 秒)
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
Attribute-Based Encryption Authorization Classification
2018/11/5
Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the outside, people usually encrypt the data ...
Multi-client Predicate-only Encryption for Conjunctive Equality Tests
multi-client functional encryption predicate-only encryption privacy-preserving multi-client monitoring
2018/6/5
We propose the first multi-client predicate-only encryption scheme capable of efficiently testing the equality of two encrypted vectors. Our construction can be used for the privacy-preserving monitor...
CROSS VALIDATION ON THE EQUALITY OF UAV-BASED AND CONTOUR-BASED DEMS
UAV Photogrammetry Digital Elevation Model Topographic surveying Ground Control Points Accuracy analysis
2018/5/15
Unmanned Aerial Vehicles (UAV) have been widely used for Digital Elevation Model (DEM) generation in geographic applications. This paper proposes a novel framework of generating DEM from UAV images. I...
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
insider attacks chosen ciphertext attacks modification
2018/4/25
At ACISP 2017, Wu et al. presented an identity-based encryption with equality test (IBEET) that considers to prevent insider attacks. To analyze its security, they proposed a new security notion for I...
Organizing Equality is a major international conference hosted by members of the Faculty of Information and Media Studies at Western University, and will take place at Museum London between the 24th a...
Access Control Encryption for Equality, Comparison, and More
Access Control Encryption pairings predicates
2017/2/20
Access Control Encryption (ACE) is a novel paradigm for encryption which allows to control not only what users in the system are allowed to \emph{read} but also what they are allowed to \emph{write}.
Public Key Encryption with Equality Test in the Standard Model
Public key encryption with equality test identity-based encryption with equality test standard model
2017/1/3
Public key encryption with equality test (PKEET) is a cryptosystem that allows a tester who has trapdoors issued by one or more users UiUi to perform equality tests on ciphertexts encrypted using publ...
Certificateless Public Key Encryption with Equality Test
certificateless public key encryption public key encryption equality test
2016/12/12
In this paper, we propose the concept of certificateless public key encryption with equality test (CL-PKEET) to solve the key escrow problem in IBEET. More in details, we first give the definition of ...
Entailment with Conditional Equality Constraints
Entailment Conditional Equality Constraints
2016/5/24
Equality constraints (unification constraints) have widespread use in program analysis, most notably in static polymorphic type systems. Conditional equality constraints extend equality constraints wi...
Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings
PKEET public-key cryptography
2016/3/14
In recent years, public key encryption with equality test (PKEET) has become
a hot research topic in the cryptography community due to the advancement of cloud
computing. Recently, Ma et al. propose...
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
group signatures verifiable controllable linkability non-interactive plaintext (in-)equality proofs
2016/2/23
Group signatures are an important privacy-enhancing tool
that allow to anonymously sign messages on behalf of a group. A recent
feature for group signatures is controllable linkability, where a dedi...
Experimental Test of Quantum Jarzynski Equality with a Trapped Ion System
Quantum Jarzynski Equality Trapped Ion System
2016/1/22
TheJarzynskiequalityrelatesthefree-energydiferencebetweentwoequilibriumstatestotheworkdoneonasystemthrough far-from-equilibriumprocesses amilestonethatbuildsonthepioneeringworkofClausiusandKelvin.Alth...
RELATIONSHIPS OF EQUALITY: A CAMPING TRIP REVISITED
Socialism camping trip justice equality
2015/11/10
Jerry Cohen's last book, Why Not Socialism?, is short and charming. His arguments are presented as comments on an imagined camping trip, on which, he cogently shows, most people would "strongly favor ...
"Equality of Arms": Challenges Confronting the Legal Profession in the Emerging International Criminal Justice System
Legal Profession Emerging International Criminal Justice System
2015/8/4
The protection of the rule of law requires that the international criminal justice system focus on two key elements: (i) the substantive objective of ending impunity by bringing war criminals to justi...
New Packaging for Left-Over Big Data: "Identity Proofing" and "Equality Monitoring"
Equality Monitoring Identity Proofing
2015/8/4
“Identity Proofing” is a commercial database search product recently adopted by the US Department of Homeland Security (DHS), other government agencies, and commercial entities, paradoxically, to veri...