搜索结果: 1-15 共查到“Authority”相关记录52条 . 查询时间(0.075 秒)
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
anonymous authentication attribute collusion attack
2019/6/14
We propose a decentralized multi-authority anonymous authentication scheme in which a prover and a verifier are non-interactive. We give two security definitions; resistance against collusion attacks ...
Multi-Authority Attribute-Based Encryption from LWE in the OT Model
attribute-based encryption LWE
2019/3/13
In a (ciphertext policy) attribute-based encryption (ABE) scheme, a ciphertext is associated with a predicate ϕϕ and a secret key is associated with a string xx such that a key decrypts a ci...
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
attribute based signature anonymous credentials threshold cryptography
2019/3/1
In this work, we revisit multi-authority attribute based signatures (MA-ABS), and elaborate on the limitations of the current MA-ABS schemes to provide a hard to achieve (yet very useful) combination ...
DEVELOPING GIS-BASED DISASTER MANAGEMENT SYSTEM FOR LOCAL AUTHORITY – CASE STUDY IN MALAYSIA
GIS Map publishing Disaster management
2018/4/18
This paper describes the development of geospatial-based disaster management system for an agency at regional level. Important aspects of the system such as spatial data, geospatial database, interfac...
DEVELOPING GIS-BASED DISASTER MANAGEMENT SYSTEM FOR LOCAL AUTHORITY – CASE STUDY IN MALAYSIA
GIS Map publishing Disaster managemen
2018/5/8
This paper describes the development of geospatial-based disaster management system for an agency at regional level. Important aspects of the system such as spatial data, geospatial database, interfac...
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption
Identity-Based Revocation Delegation Attribute-Based Encryption
2017/11/20
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been proposed to implement fine-grained access control. Data owners encrypt data with a certain access policy so that only data users whose at...
Federal budget authority for research and development continues upward trend
Federal budget authority research development upward trend
2017/2/15
Federal budget authority for research and development (R&D) rose in Fiscal Year (FY) 2016, the third straight year of current dollar increases, according to a new report from the National Ce...
Federal budget authority for research and development continues upward trend
Federal budget authority research development upward trend
2017/1/9
Federal budget authority for research and development (R&D) rose in Fiscal Year (FY) 2016, the third straight year of current dollar increases, according to a new report from the National Ce...
Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters
ABE KP-ABE Multi Authority
2016/3/9
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms.
In our proposal, a Multiple-Authorities Key-Policy Attribute-Based Encryption
scheme is constructed in which the...
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
Attribute-Based Encryption Multi-Authority Large Universe
2016/1/5
We propose an efficient large-universe multi-authority ciphertext-policy attribute-based
encryption system. In a large-universe ABE scheme, any string can be used as an attribute of the system,
and ...
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
Attribute-Based Encryption Ciphertext-Policy Key Abuse
2015/12/29
As a sophisticated mechanism for secure fine-grained access
control, ciphertext-policy attribute-based encryption (CP-ABE) is a
highly promising solution for commercial applications such as cloud co...
Extension of Authority to Confer Bachelor of Education Degrees in Alberta
Alberta Education Degrees
2015/9/22
This retrospective policy study identified how and why authority to confer Bachelor of Education degrees was extended to private colleges in Alberta. Data collection consisted of document review and i...
Low-authority controller design via convex optimization
Controller design system characteristic values of perturbation theory design sparse actuators and sensors
2015/8/11
In this paper we address the problem of low-authority controller (LAC) design. The premise is that the actuators have limited authority, and hence cannot significantly shift the eigenvalues of the sys...
Communication Complexity and Coordination by Authority
Authority Complexity and Coordination
2015/7/31
We prove that the simplest communication allowing two players to coordinate on a course
of action is authority (letting one player choose an action). We also consider the case where
each player poss...
Communication Complexity and Coordination by Authority
Authority Complexity and Coordination
2015/7/31
We prove that the simplest communication allowing two players to coordinate on a course
of action is authority (letting one player choose an action). We also consider the case where
each player poss...