搜索结果: 1-15 共查到“Tracing”相关记录108条 . 查询时间(0.088 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Tracing the Evolution of SMBHs and Stellar Objects in Galaxy Mergers: A Multi-mass Direct N-body Model
星系合并 SMBH 恒星物体演化 多质量 直接N体模型
2023/11/13
New Approaches to Traitor Tracing with Embedded Identities
traitor tracing public-key cryptography
2019/8/30
In a traitor tracing (TT) system for nn users, every user has his/her own secret key. Content providers can encrypt messages using a public key, and each user can decrypt the ciphertext using his/her ...
Group signatures allow users of a group to sign messages anonymously in the name of the group, while incorporating a tracing mechanism to revoke anonymity and identify the signer of any message. Since...
A traitor tracing scheme is a public key encryption scheme for which there are many secret decryption keys. Any of these keys can decrypt a ciphertext; moreover, even if a coalition of users collude, ...
Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
broadcast encryption private linear key agreement traitor tracing
2018/5/28
Private linear key agreement (PLKA) enables a group of users to agree upon a common session key in a broadcast encryption (BE) scenario, while traitor tracing (TT) system allows a tracer to identify c...
In this work we provide a traitor tracing construction with ciphertexts that grow polynomially in log(n) where n is the number of users and prove it secure under the Learning with Errors (LWE) assumpt...
Risky Traitor Tracing and New Differential Privacy Negative Results
Traitor Tracing Differential Privacy
2017/11/27
Finally, we can capture impossibility results for differential privacy from risky traitor tracing. Since our ciphertexts are short (O(λ)O(λ)), thus we get the negative result which matches what one wo...
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
BLISS branch tracing SPA
2017/6/5
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the most promising candidates for post-quantum-secure signatures, against side-channel attacks. Several w...
Contact tracing and targeted insecticide spraying can curb dengue outbreaks
Contact tracing targeted insecticide spraying dengue outbreaks
2017/3/14
Contact tracing -- a process of identifying everyone who has come into contact with those infected by a particular disease -- combined with targeted, indoor spraying of insecticide can greatly reduce ...
Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
Traitor Tracing Revocation Ciphertext-policy Attribute Based Encryption
2016/12/15
A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows users to specify the access policies without having to know the identities of users. In this paper, we contribute by proposing an ABE sch...
Strong Hardness of Privacy from Weak Traitor Tracing
differential privacy traitor-tracing indistinguishability obfuscation
2016/7/22
Despite much study, the computational complexity of differential privacy remains poorly understood. In this paper we consider the computational complexity of accurately answering a family QQ of statis...
Tracing organizing principles:Learning from the history of systems biology
systems biology organizing principles general systems theory design principles mathematical modeling
2016/6/13
With the emergence of systems biology the notion of organizing principles is being highlighted as a key research aim. Researchers attempt to ‘reverse engineer’ the functional organization of biologica...
Tracing shift in Czech rural development paradigm (Reflections of Local Action Groups in the media)
content analysis endogenous rural development LEADER approach
2016/5/11
Local Action Groups (LAG) as actors in the EU rural development policy reflect the endogenous paradigm. They utilize the cooperation of their members and social networks to achieve the goals defined i...
In the field of collusion-resistant traitor tracing, Oosterwijk et al. recently determined the optimal suspicion
function for simple decoders. Earlier, Moulin also considered another type of decoder:...