Provable Security最新文献

筛选
英文 中文
Secure Naïve Bayesian Classification over Encrypted Data in Cloud 安全Naïve云中加密数据的贝叶斯分类
Provable Security Pub Date : 2016-11-10 DOI: 10.1007/978-3-319-47422-9_8
Xingxin Li, Youwen Zhu, Jian Wang
{"title":"Secure Naïve Bayesian Classification over Encrypted Data in Cloud","authors":"Xingxin Li, Youwen Zhu, Jian Wang","doi":"10.1007/978-3-319-47422-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-47422-9_8","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115348622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage 可更新有损陷门函数及其在连续泄漏中的应用
Provable Security Pub Date : 2016-11-10 DOI: 10.1007/978-3-319-47422-9_18
Sujuan Li, Y. Mu, Mingwu Zhang, Futai Zhang
{"title":"Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage","authors":"Sujuan Li, Y. Mu, Mingwu Zhang, Futai Zhang","doi":"10.1007/978-3-319-47422-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-47422-9_18","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125079549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identity-Based Batch Provable Data Possession 基于身份的批量可证明数据占有
Provable Security Pub Date : 2016-11-10 DOI: 10.1007/978-3-319-47422-9_7
Fu-cai Zhou, Su Peng, Jian Xu, Zifeng Xu
{"title":"Identity-Based Batch Provable Data Possession","authors":"Fu-cai Zhou, Su Peng, Jian Xu, Zifeng Xu","doi":"10.1007/978-3-319-47422-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-47422-9_7","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125926200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Homomorphic Proxy Re-encryption from Lattices 基于格的同态代理重加密
Provable Security Pub Date : 2016-11-10 DOI: 10.1007/978-3-319-47422-9_21
Chunguang Ma, Juyan Li, Weiping Ouyang
{"title":"A Homomorphic Proxy Re-encryption from Lattices","authors":"Chunguang Ma, Juyan Li, Weiping Ouyang","doi":"10.1007/978-3-319-47422-9_21","DOIUrl":"https://doi.org/10.1007/978-3-319-47422-9_21","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"30 1‐2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113954082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Unique Signature with Short Output from CDH Assumption 基于CDH假设的短输出唯一签名
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_26
Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng
{"title":"Unique Signature with Short Output from CDH Assumption","authors":"Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng","doi":"10.1007/978-3-319-26059-4_26","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_26","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115141517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher 基于可调分组密码的全prf安全消息认证码
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_9
Yusuke Naito
{"title":"Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher","authors":"Yusuke Naito","doi":"10.1007/978-3-319-26059-4_9","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_9","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction 前向安全认证对称密钥交换协议:新的安全模型和安全构造
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_8
Suvradip Chakraborty, G. Paul, C. Rangan
{"title":"Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction","authors":"Suvradip Chakraborty, G. Paul, C. Rangan","doi":"10.1007/978-3-319-26059-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_8","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121654735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols 高效无条件安全比较和保护隐私的机器学习分类协议
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_20
B. David, Rafael Dowsley, R. Katti, Anderson C. A. Nascimento
{"title":"Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols","authors":"B. David, Rafael Dowsley, R. Katti, Anderson C. A. Nascimento","doi":"10.1007/978-3-319-26059-4_20","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_20","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122610917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Attribute-Based Encryption for Finite Automata from LWE 基于属性的LWE有限自动机加密
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_14
Xavier Boyen, Qinyi Li
{"title":"Attribute-Based Encryption for Finite Automata from LWE","authors":"Xavier Boyen, Qinyi Li","doi":"10.1007/978-3-319-26059-4_14","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_14","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133491217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach Ad Hoc组的轻量级匿名认证:环签名方法
Provable Security Pub Date : 2015-11-24 DOI: 10.1007/978-3-319-26059-4_12
Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen
{"title":"Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach","authors":"Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen","doi":"10.1007/978-3-319-26059-4_12","DOIUrl":"https://doi.org/10.1007/978-3-319-26059-4_12","url":null,"abstract":"","PeriodicalId":215672,"journal":{"name":"Provable Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125468830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信