Results for 'Homomorphic encryption'

263 found
Order:
  1.  16
    Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study.Effy Vayena, Marcello Ienca & James Scheibner - 2022 - BMC Medical Ethics 23 (1):1-13.
    BackgroundIncreasingly, hospitals and research institutes are developing technical solutions for sharing patient data in a privacy preserving manner. Two of these technical solutions are homomorphic encryption and distributed ledger technology. Homomorphic encryption allows computations to be performed on data without this data ever being decrypted. Therefore, homomorphic encryption represents a potential solution for conducting feasibility studies on cohorts of sensitive patient data stored in distributed locations. Distributed ledger technology provides a permanent record on all (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2. Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service.Huijuan Lian, Weidong Qiu, Zheng di YanHuang & Jie Guo - 2017 - Complexity:1-14.
    With the development of mobile communication technology, location-based services are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest information with (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  7
    Implications of computer science theory for the simulation hypothesis.David Wolpert - manuscript
    The simulation hypothesis has recently excited renewed interest, especially in the physics and philosophy communities. However, the hypothesis specifically concerns {computers} that simulate physical universes, which means that to properly investigate it we need to couple computer science theory with physics. Here I do this by exploiting the physical Church-Turing thesis. This allows me to introduce a preliminary investigation of some of the computer science theoretic aspects of the simulation hypothesis. In particular, building on Kleene's second recursion theorem, I prove (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  17
    Deep learning for content-based image retrieval in FHE algorithms.Mustafa Musa Jaber & Sura Mahmood Abdullah - 2023 - Journal of Intelligent Systems 32 (1).
    Content-based image retrieval (CBIR) is a technique used to retrieve image from an image database. However, the CBIR process suffers from less accuracy to retrieve many images from an extensive image database and prove the privacy of images. The aim of this article is to address the issues of accuracy utilizing deep learning techniques such as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon–Kim–Kim–Song (CKKS). The system has been (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  37
    Strong Homomorphisms, Category Theory, and Semantic Paradox.Jonathan Wolfgram & Roy T. Cook - 2022 - Review of Symbolic Logic 15 (4):1070-1093.
    In this essay we introduce a new tool for studying the patterns of sentential reference within the framework introduced in [2] and known as the language of paradox $\mathcal {L}_{\mathsf {P}}$ : strong $\mathcal {L}_{\mathsf {P}}$ -homomorphisms. In particular, we show that (i) strong $\mathcal {L}_{\mathsf {P}}$ -homomorphisms between $\mathcal {L}_{\mathsf {P}}$ constructions preserve paradoxicality, (ii) many (but not all) earlier results regarding the paradoxicality of $\mathcal {L}_{\mathsf {P}}$ constructions can be recast as special cases of our central result regarding (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  27
    Encrypting human rights: The intertwining of resistant voices in the UK state surveillance debate.James Allen-Robertson & Amy Stevens - 2021 - Big Data and Society 8 (1).
    The Snowden revelations in 2013 redrew the lines of debate surrounding surveillance, exposing the extent of state surveillance across multiple nations and triggering legislative reform in many. In the UK, this was in the form of the Investigatory Powers Act. As a contribution to understanding resistance to expanding state surveillance activities, this article reveals the intertwining of diverse interests and voices which speak in opposition to UK state surveillance. Through a computational topic modelling-based mixed methods analysis of the submissions made (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  33
    Definable homomorphisms of abelian groups in o-minimal structures.Ya'acov Peterzil & Sergei Starchenko - 1999 - Annals of Pure and Applied Logic 101 (1):1-27.
    We investigate the group of definable homomorphisms between two definable abelian groups A and B, in an o-minimal structure . We prove the existence of a “large”, definable subgroup of . If contains an infinite definable set of homomorphisms then some definable subgroup of B admits a definable multiplication, making it into a field. As we show, all of this can be carried out not only in the underlying structure but also in any structure definable in.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  8.  14
    σ-homomorphisms from the Borel σ-algebra into the Loeb σ-algebra.Hermann Render - 2001 - Annals of Pure and Applied Logic 111 (1-2):15-21.
    In nonstandard measure theory the standard part map is very useful to represent standard measures by Loeb measures. We give here a different method of representing measures using the concept of a σ -homomorphism. As an application a measure extension theorem is derived. Finally a nonstandard proof of a result of Pták is given showing that his assumption of nonmeasurable cardinality is redundant.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  9.  42
    Homomorphisms between Verma modules in characteristic P.James Franklin - 1988 - Journal of Algebra 112:58-85.
    The composition series of Verma modules and homomorphisms between Verma modules in the case of a complex semisimple Lie algebra were studied by Verma and by Bernstein, Gelfand and Gelfand. The author studies homomorphisms between the Verma modules in characteristic p.
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  31
    Homomorphisms and chains of Kripke models.Morteza Moniri & Mostafa Zaare - 2011 - Archive for Mathematical Logic 50 (3-4):431-443.
    In this paper we define a suitable version of the notion of homomorphism for Kripke models of intuitionistic first-order logic and characterize theories that are preserved under images and also those that are preserved under inverse images of homomorphisms. Moreover, we define a notion of union of chain for Kripke models and define a class of formulas that is preserved in unions of chains. We also define similar classes of formulas and investigate their behavior in Kripke models. An application to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  10
    Encryption of graphic information by means of transformation matrixes for protection against decofing by neural algorithms.Yunak O. M., Stryxaluk B. M. & Yunak O. P. - 2020 - Artificial Intelligence Scientific Journal 25 (2):15-20.
    The article deals with the algorithm of encrypting graphic information using transformation matrixes. It presents the actions that can be done with the image. The article also gives algorithms for forming matrixes that are created with the use of random processes. Examples of matrixes and encryption results are shown. Calculations of the analysis of combinations and conclusions to them are carried out. The article shows the possibilities and advantages of this image encryption algorithm. The proposed algorithm will allow (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  1
    Discontinuous Homomorphisms of with.Bob A. Dumas - forthcoming - Journal of Symbolic Logic:1-51.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  23
    Encryption of Data Streams using Pauli spins ½ matrices.D. Sravana Kurmar, C. H. Suneetha & A. Chandra Sekhar - 2010 - In Giselle Walker & E. S. Leedham-Green (eds.), Identity. Cambridge University Press. pp. 10--01.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14. Automatic continuity of group homomorphisms.Christian Rosendal - 2009 - Bulletin of Symbolic Logic 15 (2):184-214.
    We survey various aspects of the problem of automatic continuity of homomorphisms between Polish groups.
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  15.  17
    Homomorphisms and quotients of degree structures.Burkhard Englert, Manuel Lerman & Kevin Wald - 2003 - Annals of Pure and Applied Logic 123 (1-3):193-233.
    We investigate homomorphisms of degree structures with various relations, functions and constants. Our main emphasis is on pseudolattices, i.e., partially ordered sets with a join operation and relations simulating the meet operation. We show that there are no finite quotients of the pseudolattice of degrees or of the pseudolattice of degrees 0′, but that many finite distributive lattices are pseudolattice quotients of the pseudolattice of computably enumerable degrees.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  16.  10
    Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System.Nehal Abd El-Salam Mohamed, Aliaa Youssif & Hala Abdel-Galil El-Sayed - 2022 - Complexity 2022:1-20.
    Topic of quantum chaos has begun to draw increasing attention in recent years. So, to ensure the security of digital image, an image encryption algorithm based on combining a hyperchaotic system and quantum 3D logistic map is proposed. This algorithm is applied in four stages. Initially, the key generator builds upon the foundation of mean for any row or column of the edges of the plain image. Its output value is used to yield initial conditions and parameters of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  12
    Continuous homomorphisms of R onto a compact group.Douglas Bridges & Matthew Hendtlass - 2010 - Mathematical Logic Quarterly 56 (2):191-197.
    It is shown within Bishop's constructive mathematics that, under one extra, classically automatic, hypothesis, a continuous homomorphism from R onto a compact metric abelian group is periodic, but that the existence of the minimum value of the period is not derivable.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  15
    Ω-homomorphisms and ω-groups.C. H. Applebaum - 1971 - Journal of Symbolic Logic 36 (1):55-65.
  19.  8
    $omega$-Homomorphisms and $omega$-Groups.C. H. Applebaum - 1971 - Journal of Symbolic Logic 36 (1):55-65.
  20. Encrypted vanguards and bleeding-edge technologies : signals intelligence, radio drama, and the false transmissions of the special operations executive.James Harding - 2015 - In Kimberly Jannarone (ed.), Vanguard performance beyond left and right. Ann Arbor: Univ Of Michigan Press.
     
    Export citation  
     
    Bookmark  
  21.  32
    Synergistic Information Processing Encrypts Strategic Reasoning in Poker.Seth Frey, Dominic K. Albino & Paul L. Williams - 2018 - Cognitive Science 42 (5):1457-1476.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  9
    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.Adel R. Alharbi, Jawad Ahmad, Undefined Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis & William J. Buchanan - 2022 - Complexity 2022:1-15.
    With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural power, among other characteristics. In this work, a secure image encryption scheme (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  12
    A Novel Image Encryption Scheme Based on PWLCM and Standard Map.Yucheng Chen, Chunming Tang & Zongxiang Yi - 2020 - Complexity 2020:1-23.
    In the past decades, considerable attention has been paid to the chaos-based image encryption schemes owing to their characteristics such as extreme sensitivity to initial conditions and parameters, pseudo-randomness, and unpredictability. However, some schemes have been proven to be insecure due to using a single chaotic system. To increase the security, this work proposes a novel image encryption scheme based on the piecewise linear chaotic map and the standard map. To the best of our knowledge, it is the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  29
    Infinitesimal Comparisons: Homomorphisms between Giordano’s Ring and the Hyperreal Field.Patrick Reeder - 2017 - Notre Dame Journal of Formal Logic 58 (2):205-214.
    The primary purpose of this paper is to analyze the relationship between the familiar non-Archimedean field of hyperreals from Abraham Robinson’s nonstandard analysis and Paolo Giordano’s ring extension of the real numbers containing nilpotents. There is an interesting nontrivial homomorphism from the limited hyperreals into the Giordano ring, whereas the only nontrivial homomorphism from the Giordano ring to the hyperreals is the standard part function, namely, the function that maps a value to its real part. We interpret this asymmetry to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  22
    A protocol to encrypt digital images using chaotic maps and memory cellular automata.A. M. del Rey, G. R. Sanchez & A. de la Villa Cuenca - 2015 - Logic Journal of the IGPL 23 (3):485-494.
    Direct download  
     
    Export citation  
     
    Bookmark  
  26.  47
    Axiomatizable classes with strong homomorphisms.S. S. Goncharov - 1987 - Studia Logica 46 (2):113 - 120.
    In the paper A. I. Malcev's problem on the characterization of axioms for classes with strong homomorphisms is being solved.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27.  10
    A Simple Image Encryption Based on Binary Image Affine Transformation and Zigzag Process.Adélaïde Nicole Kengnou Telem, Cyrille Feudjio, Balamurali Ramakrishnan, Hilaire Bertrand Fotsin & Karthikeyan Rajagopal - 2022 - Complexity 2022:1-22.
    In this paper, we propose a new and simple method for image encryption. It uses an external secret key of 128 bits long and an internal secret key. The novelties of the proposed encryption process are the methods used to extract an internal key to apply the zigzag process, affine transformation, and substitution-diffusion process. Initially, an original gray-scale image is converted into binary images. An internal secret key is extracted from binary images. The two keys are combined to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  39
    Computable and continuous partial homomorphisms on metric partial algebras.Viggo Stoltenberg-Hansen & John V. Tucker - 2003 - Bulletin of Symbolic Logic 9 (3):299-334.
    We analyse the connection between the computability and continuity of functions in the case of homomorphisms between topological algebraic structures. Inspired by the Pour-El and Richards equivalence theorem between computability and boundedness for closed linear operators on Banach spaces, we study the rather general situation of partial homomorphisms between metric partial universal algebras. First, we develop a set of basic notions and results that reveal some of the delicate algebraic, topological and effective properties of partial algebras. Our main computability concepts (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  29.  14
    Computable and Continuous Partial Homomorphisms on Metric Partial Algebras.Viggo Stoltenberg-Hansen & John V. Tucker - 2003 - Bulletin of Symbolic Logic 9 (3):299-334.
    We analyse the connection between the computability and continuity of functions in the case of homomorphisms between topological algebraic structures. Inspired by the Pour-El and Richards equivalence theorem between computability and boundedness for closed linear operators on Banach spaces, we study the rather general situation of partial homomorphisms between metric partial universal algebras. First, we develop a set of basic notions and results that reveal some of the delicate algebraic, topological and effective properties of partial algebras. Our main computability concepts (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  30.  27
    Subalgebras and homomorphisms of semi-post algebras.Nguyen Cat Ho & Helena Rasiowa - 1987 - Studia Logica 46 (2):161 - 175.
    Semi-Post algebras have been introduced and investigated in [6]. This paper is devoted to semi-Post subalgebras and homomorphisms. Characterization of semi-Post subalgebras and homomorphisms, relationships between subalgebras and homomorphisms of semi-Post algebras and of generalized Post algebras are examined.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  25
    Normalization as a homomorphic image of cut-elimination.Garrel Pottinger - 1977 - Annals of Mathematical Logic 12 (3):323.
  32.  15
    A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate Logistic Maps.Priyanka Jaroli, Shelza Dua, Mohit Dua & Ankita Bisht - 2019 - Journal of Intelligent Systems 29 (1):1246-1260.
    The paper presents an approach to encrypt the color images using bit-level permutation and alternate logistic map. The proposed method initially segregates the color image into red, green, and blue channels, transposes the segregated channels from the pixel-plane to bit-plane, and scrambles the bit-plane matrix using Arnold cat map (ACM). Finally, the red, blue, and green channels of the scrambled image are confused and diffused by applying alternate logistic map that uses a four-dimensional Lorenz system to generate a pseudorandom number (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  8
    On Sequences of Homomorphisms Into Measure Algebras and the Efimov Problem.Piotr Borodulin–Nadzieja & Damian Sobota - 2023 - Journal of Symbolic Logic 88 (1):191-218.
    For given Boolean algebras$\mathbb {A}$and$\mathbb {B}$we endow the space$\mathcal {H}(\mathbb {A},\mathbb {B})$of all Boolean homomorphisms from$\mathbb {A}$to$\mathbb {B}$with various topologies and study convergence properties of sequences in$\mathcal {H}(\mathbb {A},\mathbb {B})$. We are in particular interested in the situation when$\mathbb {B}$is a measure algebra as in this case we obtain a natural tool for studying topological convergence properties of sequences of ultrafilters on$\mathbb {A}$in random extensions of the set-theoretical universe. This appears to have strong connections with Dow and Fremlin’s result stating (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  13
    Privacy and the encryption debate.Adam Moore - 2000 - Knowledge, Technology & Policy 12 (4):72-84.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  8
    A Color Image Encryption Scheme Based on a Novel 3D Chaotic Mapping.Chunyuan Liu & Qun Ding - 2020 - Complexity 2020:1-20.
    Low-dimensional chaotic mappings are simple functions that have low computation cost and are easy to realize, but applying them in a cryptographic algorithm will lead to security vulnerabilities. To overcome this shortcoming, this paper proposes the coupled chaotic system, which coupled the piecewise and Henon mapping. Simulation results indicate that the novel mapping has better complexity and initial sensitivity and larger key space compared with the original mapping. Then, a new color image encryption algorithm is proposed based on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  16
    Automatic Continuity for Homomorphisms into Free Products.Konstantin Slutsky - 2013 - Journal of Symbolic Logic 78 (4):1288-1306.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  37.  21
    Preservation by homomorphisms and infinitary languages.Tapani Hyttinen - 1991 - Notre Dame Journal of Formal Logic 32 (2):167-172.
  38.  22
    On Baire Measurable Homomorphisms of Quotients of the Additive Group of the Reals.Vladimir Kanovei & Michael Reeken - 2000 - Mathematical Logic Quarterly 46 (3):377-384.
    The quotient ℝ/G of the additive group of the reals modulo a countable subgroup G does not admit nontrivial Baire measurable automorphisms.
    Direct download  
     
    Export citation  
     
    Bookmark  
  39. Computer Ethics: Encryption: Dvd.Ken Knisely & Patrick Sullivan - 2001 - Milk Bottle Productions.
    Should all digital communication be accessible to government inspection? Is robust cryptography in the hands of the public a threat to our national security? With Dorothy Denning and Patrick Sullivan.
     
    Export citation  
     
    Bookmark  
  40. Computer Ethics: Encryption: No Dogs or Philosophers Allowed.Ken Knisely, Dorothy Denning & Patrick Sullivan - forthcoming - DVD.
    Should all digital communication be accessible to government inspection? Is robust cryptography in the hands of the public a threat to our national security? With Dorothy Denning and Patrick Sullivan.
     
    Export citation  
     
    Bookmark  
  41.  15
    Projective clone homomorphisms.Manuel Bodirsky, Michael Pinsker & András Pongrácz - 2021 - Journal of Symbolic Logic 86 (1):148-161.
    It is known that a countable $\omega $ -categorical structure interprets all finite structures primitively positively if and only if its polymorphism clone maps to the clone of projections on a two-element set via a continuous clone homomorphism. We investigate the relationship between the existence of a clone homomorphism to the projection clone, and the existence of such a homomorphism which is continuous and thus meets the above criterion.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  42.  17
    Pseudorandom Number Generator Based on Three Kinds of Four-Wing Memristive Hyperchaotic System and Its Application in Image Encryption.Xi Chen, Shuai Qian, Fei Yu, Zinan Zhang, Hui Shen, Yuanyuan Huang, Shuo Cai, Zelin Deng, Yi Li & Sichun Du - 2020 - Complexity 2020:1-17.
    In this paper, we propose a method to design the pseudorandom number generator using three kinds of four-wing memristive hyperchaotic systems with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspective of cryptography. In addition, PRNG (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  43.  3
    Universal Structures with Forbidden Homomorphisms. [REVIEW]Jaroslav Nešetril & Jan Hubicka - 2015 - In Åsa Hirvonen, Juha Kontinen, Roman Kossak & Andrés Villaveces (eds.), Logic Without Borders: Essays on Set Theory, Model Theory, Philosophical Logic and Philosophy of Mathematics. Boston: De Gruyter. pp. 241-264.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  47
    Distributive lattices with a dual homomorphic operation.Alasdair Urquhart - 1979 - Studia Logica 38 (2):201 - 209.
    The lattices of the title generalize the concept of a De Morgan lattice. A representation in terms of ordered topological spaces is described. This topological duality is applied to describe homomorphisms, congruences, and subdirectly irreducible and free lattices in the category. In addition, certain equational subclasses are described in detail.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  45.  4
    Strategy construction using homomorphisms between games.R. B. Banerji & G. W. Ernst - 1972 - Artificial Intelligence 3:223-249.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  9
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, gain insights from and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  19
    Horn A.. On α-homomorphic images of α-rings of sels. Fundamenta mathematicae, vol. 51 , pp. 259–266.Philip Dwinger - 1969 - Journal of Symbolic Logic 33 (4):624-624.
  48.  62
    Abstract logics, logic maps, and logic homomorphisms.Steffen Lewitzka - 2007 - Logica Universalis 1 (2):243-276.
    . What is a logic? Which properties are preserved by maps between logics? What is the right notion for equivalence of logics? In order to give satisfactory answers we generalize and further develop the topological approach of [4] and present the foundations of a general theory of abstract logics which is based on the abstract concept of a theory. Each abstract logic determines a topology on the set of theories. We develop a theory of logic maps and show in what (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  49. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re- (...) keys are only issued to legitimate users. An in depth analysis shows that our scheme is secure, flexible and efficient for mobile cloud computing. (shrink)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  7
    Families of ultrafilters, and homomorphisms on infinite direct product algebras.George M. Bergman - 2014 - Journal of Symbolic Logic 79 (1):223-239.
1 — 50 / 263