Provable Security最新文献

筛选
英文 中文
Short Lattice Signatures in the Standard Model with Efficient Tag Generation 具有高效标签生成的标准模型中的短格签名
Provable Security Pub Date : 2020-11-29 DOI: 10.1007/978-3-030-62576-4_5
Kaisei Kajita, Kazuto Ogawa, K. Nuida, T. Takagi
{"title":"Short Lattice Signatures in the Standard Model with Efficient Tag Generation","authors":"Kaisei Kajita, Kazuto Ogawa, K. Nuida, T. Takagi","doi":"10.1007/978-3-030-62576-4_5","DOIUrl":"https://doi.org/10.1007/978-3-030-62576-4_5","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127839140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring 环上(仅)SS-3PC的恒轮私有决策树评价
Provable Security Pub Date : 2020-11-29 DOI: 10.1007/978-3-030-62576-4_15
Hikaru Tsuchida, T. Nishide, Yusaku Maeda
{"title":"Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring","authors":"Hikaru Tsuchida, T. Nishide, Yusaku Maeda","doi":"10.1007/978-3-030-62576-4_15","DOIUrl":"https://doi.org/10.1007/978-3-030-62576-4_15","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130469671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers 利用签名者之间的预通信实现无配对聚合签名
Provable Security Pub Date : 2020-11-29 DOI: 10.1007/978-3-030-62576-4_4
Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, K. Ohta
{"title":"Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers","authors":"Kaoru Takemure, Yusuke Sakai, Bagus Santoso, Goichiro Hanaoka, K. Ohta","doi":"10.1007/978-3-030-62576-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-62576-4_4","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127008825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Cumulative Reward Maximization in Linear Stochastic Bandits 线性随机强盗的安全累积奖励最大化
Provable Security Pub Date : 2020-11-28 DOI: 10.1007/978-3-030-62576-4_13
Radu Ciucanu, Anatole Delabrouille, P. Lafourcade, Marta Soare
{"title":"Secure Cumulative Reward Maximization in Linear Stochastic Bandits","authors":"Radu Ciucanu, Anatole Delabrouille, P. Lafourcade, Marta Soare","doi":"10.1007/978-3-030-62576-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-62576-4_13","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122459464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search 利用关键字搜索增强无证书公钥认证加密的安全性
Provable Security Pub Date : 2019-10-01 DOI: 10.1007/978-3-030-31919-9_7
Xueqiao Liu, Hongbo Li, Guomin Yang, W. Susilo, Joseph Tonien, Qiong Huang
{"title":"Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search","authors":"Xueqiao Liu, Hongbo Li, Guomin Yang, W. Susilo, Joseph Tonien, Qiong Huang","doi":"10.1007/978-3-030-31919-9_7","DOIUrl":"https://doi.org/10.1007/978-3-030-31919-9_7","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124869559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training 按需隐私保护的成本效益边缘情报模型训练
Provable Security Pub Date : 2019-10-01 DOI: 10.1007/978-3-030-31919-9_19
Zhi Zhou, Xu Chen
{"title":"On-demand Privacy Preservation for Cost-Efficient Edge Intelligence Model Training","authors":"Zhi Zhou, Xu Chen","doi":"10.1007/978-3-030-31919-9_19","DOIUrl":"https://doi.org/10.1007/978-3-030-31919-9_19","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG 使用改进的DAWG的空间效率和安全的子字符串可搜索对称加密
Provable Security Pub Date : 2019-10-01 DOI: 10.1007/978-3-030-31919-9_8
Hiroaki Yamamoto, Y. Wachi, H. Fujiwara
{"title":"Space-Efficient and Secure Substring Searchable Symmetric Encryption Using an Improved DAWG","authors":"Hiroaki Yamamoto, Y. Wachi, H. Fujiwara","doi":"10.1007/978-3-030-31919-9_8","DOIUrl":"https://doi.org/10.1007/978-3-030-31919-9_8","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117036311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Practical Lattice-Based Sequential Aggregate Signature 一种实用的基于格的顺序聚合签名
Provable Security Pub Date : 2019-10-01 DOI: 10.1007/978-3-030-31919-9_6
Zhipeng Wang, Qianhong Wu
{"title":"A Practical Lattice-Based Sequential Aggregate Signature","authors":"Zhipeng Wang, Qianhong Wu","doi":"10.1007/978-3-030-31919-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-31919-9_6","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125608969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature 一种基于在线/离线无证书聚合签名的车载Ad Hoc网络条件隐私保护认证方案
Provable Security Pub Date : 2019-10-01 DOI: 10.1007/978-3-030-31919-9_4
Kang Li, M. Au, I. W. Ho, Yilei Wang
{"title":"An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature","authors":"Kang Li, M. Au, I. W. Ho, Yilei Wang","doi":"10.1007/978-3-030-31919-9_4","DOIUrl":"https://doi.org/10.1007/978-3-030-31919-9_4","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115900533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Correction to: Provable Security 更正:可证明的安全性
Provable Security Pub Date : 2019-10-01 DOI: 10.1007/978-3-030-31919-9_25
Ron Steinfeld, Tsz Hon Yuen
{"title":"Correction to: Provable Security","authors":"Ron Steinfeld, Tsz Hon Yuen","doi":"10.1007/978-3-030-31919-9_25","DOIUrl":"https://doi.org/10.1007/978-3-030-31919-9_25","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123288865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信