Articles with "constant size" as a keyword



Photo by visuals from unsplash

Expressive attribute-based keyword search with constant-size ciphertext

Sign Up to like & get
recommendations!
Published in 2018 at "Soft Computing"

DOI: 10.1007/s00500-017-2701-9

Abstract: Prior to outsourcing sensitive data, users need to encrypt the data and outsource the ciphertexts to cloud servers. Therefore, efficient search techniques on encrypted data are required. Attribute-based keyword search (ABKS) is a public key… read more here.

Keywords: constant size; search; ciphertext; size ... See more keywords
Photo by nickkarvounis from unsplash

Practical Constant-Size Ring Signature

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Computer Science and Technology"

DOI: 10.1007/s11390-018-1838-z

Abstract: Bitcoin has gained its popularity for almost 10 years as a “secure and anonymous digital currency”. However, according to several recent researches, we know that it can only provide pseudonymity rather than real anonymity, and… read more here.

Keywords: size ring; ring signature; constant size; signature ... See more keywords
Photo from wikipedia

Species coexistence by wide constant size spacing.

Sign Up to like & get
recommendations!
Published in 2023 at "Proceedings of the National Academy of Sciences of the United States of America"

DOI: 10.1073/pnas.2217904120

Abstract: We consider the distribution of fruit pigeons of the genera Ptilinopus and Ducula on the island of New Guinea. Of the 21 species, between six and eight coexist inside humid lowland forests. We conducted or… read more here.

Keywords: species coexistence; coexistence wide; size spacing; wide constant ... See more keywords
Photo by charlesdeluvio from unsplash

Progressive Image Restoration Based on CP-ABE With Constant-Size Ciphertext and Constant Bilinear Calculation

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2952640

Abstract: Sharing photos on an open social platform with one-to-many features increases the leakage risk of information of the shared photos. Ciphertext-policy attribute-based encryption (CP-ABE) is a one-to-many public key cryptosystem, and its access policy can… read more here.

Keywords: size ciphertext; access; constant size; image ... See more keywords