Articles with "identity based" as a keyword



Identity-Based Quantum Designated Verifier Signature

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Theoretical Physics"

DOI: 10.1007/s10773-019-04377-0

Abstract: Designated verifier signatures are very useful in the applications such as e-voting and auction. In this paper, an identity-based quantum designated verifier signature (IDQDVS) scheme is proposed. It has the security properties such as designated… read more here.

Keywords: designated verifier; identity based; signature; verifier signature ... See more keywords

ESKI-IBE: Efficient and secure key issuing identity-based encryption with cloud privacy centers

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-7155-x

Abstract: Digital certificate validation associated with traditional public key cryptosystems make it impractical in real-world environments due to their storage cost. The identity-based cryptosystems have been proven advantageous as they do not require any digital certificate… read more here.

Keywords: key; private key; identity based; secure key ... See more keywords
Photo from archive.org

A more compact multi-id identity-based FHE scheme in the standard model and its applications

Sign Up to like & get
recommendations!
Published in 2017 at "Science China Information Sciences"

DOI: 10.1007/s11432-017-9412-3

Abstract: According to the two types of identity mapping in existed IBE schemes: one type is GPV-IBE [1] and another is other lattice-based IBE schemes [2–7], there are two types of vector ciphertexts in original IBE… read more here.

Keywords: ibe schemes; multi identity; compact multi; identity based ... See more keywords

Efficient identity-based data transmission for VANET

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-017-0650-x

Abstract: To simplify the key management processes, data transmission protocols for vehicular ad-hoc networks typically use identity-based cryptography for protecting the transmitted data. However, current identity-based data transmission protocols are mainly based on the bilinear map… read more here.

Keywords: based data; efficient; data transmission; identity based ... See more keywords
Photo from wikipedia

Process matters: Teachers benefit their classrooms and students when they deliver an identity-based motivation intervention with fidelity

Sign Up to like & get
recommendations!
Published in 2021 at "Contemporary Educational Psychology"

DOI: 10.1016/j.cedpsych.2021.101993

Abstract: Abstract Students value school success but often experience classroom norms implying that learning is easy and succeeding in school is not difficult. Applying an identity-based motivation (IBM) lens highlights three ways succeed-with-ease-not-effort norms can undermine… read more here.

Keywords: school; success; identity based; based motivation ... See more keywords

Examining the relationship between cultural subgrouping and attendance for adolescents and young adults in a cancer survivor group.

Sign Up to like & get
recommendations!
Published in 2025 at "Journal of counseling psychology"

DOI: 10.1037/cou0000804

Abstract: Absenteeism is common in group psychotherapy and has the potential to negatively affect group processes and outcomes. However, there is a scarcity of research examining predictors of group members' attendance, despite the importance of regular… read more here.

Keywords: cancer; attendance; group; identity based ... See more keywords

A secure and efficient identity-based quantum signature scheme

Sign Up to like & get
recommendations!
Published in 2024 at "AIP Advances"

DOI: 10.1063/5.0212258

Abstract: In recent years, identity-based quantum signature protocols have received much attention due to their unique advantages. Based on Bell states, we propose an efficient identity-based quantum signature scheme. In our scheme, the signer’s private key… read more here.

Keywords: scheme; based quantum; identity based; identity ... See more keywords

‘I feel like I have a superpower’: a qualitative study of adolescents’ experiences of multilingual identity development during an identity-based pedagogical intervention

Sign Up to like & get
recommendations!
Published in 2024 at "Journal of Multilingual and Multicultural Development"

DOI: 10.1080/01434632.2024.2313564

Abstract: ABSTRACT Multilingual identity, considered here as being shaped by learners evaluations, emotions and experiences relating to languages and language learning, has gained increasing attention among both researchers and practitioners. Indeed, school-based studies have not only… read more here.

Keywords: multilingual identity; identity based; identity; intervention ... See more keywords

Building social identity-based groups to enhance online peer support for patients with chronic disease: a pilot study using mixed-methods evaluation.

Sign Up to like & get
recommendations!
Published in 2022 at "Translational behavioral medicine"

DOI: 10.1093/tbm/ibac008

Abstract: Online peer support is increasingly important to encourage patients with chronic diseases to engage in successful self-management. However, studies mainly focus on individual-level participation and have not fully explored how to maximize the impact of… read more here.

Keywords: group; peer support; support; identity based ... See more keywords

Formal Reporting of Identity-Based Harassment at an Academic Medical Center: Incidence, Barriers, and Institutional Responses

Sign Up to like & get
recommendations!
Published in 2022 at "Academic Medicine"

DOI: 10.1097/acm.0000000000004711

Abstract: Purpose To examine the incidence of, barriers to, and institutional responses to formal reporting of experiences of identity-based harassment at an academic medical center. Method The authors invited 4,545 faculty and medical trainees at the… read more here.

Keywords: based harassment; cisgender women; identity based; institutional responses ... See more keywords

PAAS: PMIPv6 Access Authentication Scheme Based on Identity-Based Signature in VANETs

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2841008

Abstract: Due to the advantages of low handover latency and signaling costs, Proxy Mobile IPv6 (PMIPv6), as a localized mobility management protocol for next generation mobile network, can be well combined with vehicular ad-hoc networks. However,… read more here.

Keywords: scheme; authentication; based signature; identity based ... See more keywords