Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    ARTICLE

    The Development of Proxy Re-Encryption

    Yepeng Liu1, 2, Yongjun Ren1, 2, *, Qirun Wang3, Jinyue Xia4

    Journal of Cyber Security, Vol.2, No.1, pp. 1-8, 2020, DOI:10.32604/jcs.2020.05878

    Abstract With the diversification of electronic devices, cloud-based services have become the link between different devices. As a cryptosystem with secure conversion function, proxy re-encryption enables secure sharing of data in a cloud environment. Proxy re-encryption is a public key encryption system with ciphertext security conversion function. A semi-trusted agent plays the role of ciphertext conversion, which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key. Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al. [Blaze, Bleumer and Strauss More >

  • Open Access

    ARTICLE

    WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings

    Chunhua Li1,*, Peng Wang1, Changhong Sun1, Ke Zhou1, Ping Huang2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 319-333, 2019, DOI:10.32604/cmc.2019.03856

    Abstract The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not. Based on the general three-party audit architecture, a dynamic auditing scheme without bilinear pairings is proposed in this paper. It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence. By establishing the mapping relation between logic index and tag index of data block with index transformation table, our scheme can easily More >

  • Open Access

    ARTICLE

    On the KP Equation with Hysteresis

    Veturia Chiroiu1, Ioan Ursu2, Ligia Munteanu3, Tudor Sireteanu4

    FDMP-Fluid Dynamics & Materials Processing, Vol.8, No.1, pp. 91-106, 2012, DOI:10.3970/fdmp.2011.008.091

    Abstract The Kadomtsev-Petviashvili (KP) equation describes the evolution of nonlinear, long waves of small amplitude with slow dependence on the transverse coordinate. The KP equation coupled with the generalized play operator is studied in this paper in order to explain the dilatonic behavior of the soliton interaction and the generation of huge waves in shallow waters. Hirota bilinear method and results from a nonlinear semigroup theory are applied to simulate the resonant soliton interactions. More >

Displaying 11-20 on page 2 of 13. Per Page