scholarly journals Identity-Based On-Line/Off-Line Signcryption

Author(s):  
Dongdong Sun ◽  
Xinyi Huang ◽  
Yi Mu ◽  
Willy Susilo
Keyword(s):  
On Line ◽  

As a noteworthy business worldview, a few on-line information stages have developed to fulfill society's wants for individual explicit learning, any place a service provider assembles raw data from data givers, at that point offers data services to data clients. Notwithstanding, inside the data exchanging level, the data customers face a squeezing issue, i.e., an approach to confirm whether the service provider has actually gathered and handled data. During this paper, we propose TPDM, that effectively compose truthfulness and Privacy protection in data Markets. TPDM is structured inside in partner degree Encrypt-then-Sign way; utilize mostly homomorphism encryption and identity-based signature. It along encourage bunch confirmation, processing, and result check, though giving identity protection and data confidentiality. We used dataset and 2015 RECS dataset, severally. Our examination and investigation results that TPDM accomplishes numerous alluring properties, though obtaining low calculation and correspondence overheads once sustaining huge size data markets


Author(s):  
Jianhong Zhang ◽  
Yixian Yang ◽  
Xinxin Niu ◽  
Shengnan Gao ◽  
Hua Chen ◽  
...  

2014 ◽  
Vol 6 (2) ◽  
pp. 431-449 ◽  
Author(s):  
Elzbieta Korolczuk

This article focuses on the identity work that takes place on the biggest Polish Internet forum for infertile people (www.nasz-bocian.pl). It is an example of a wider trend of “digital groupings created by and for those who struggle with the physical and emotional burden of a disease or disability, and through blogs, chats and forums contact others who have similar experiences, while staying anonymous. Participating in on-line discussions often leads to various forms of social engagement, both on-line and off-line. The sick, their family members, partners and friends cooperate in order to change the public discourse, as well as the regulation and financing of research and the treatment of certain diseases. Emergence and proliferation of such digital groupings raise questions such as: what ails these communities? How the collective identity is constructed on-line? This article examines “boundary work, which is a specific element of collective identity construction processes. The analysis concerns how the borders are established between the different sub-groups within the digital community, and how this process involves producing novel forms of identity based on a fragmented “socially legitimized childlessness. It focuses on a sub-forum” Conscious Childlessness and is based on qualitative analysis of the posts placed there. This sub-forum was established by users who do not necessarily share the dominant collective identity around which the social mobilization on infertility in Poland coalesces. They refuse to see themselves as sick people, or as patients, attempting to construct a new collective identity based on the idea of choice and the pursuit of happiness.


2011 ◽  
Vol 22 (03) ◽  
pp. 739-756 ◽  
Author(s):  
HAN-YU LIN ◽  
CHIEN-LUNG HSU

For securing confidential applications such as credit card transactions, on-line auctions and business contract signing, etc., a convertible authenticated encryption (CAE) scheme simultaneously satisfying the properties of authenticity, confidentiality and non-repudiation is a better choice. By combining the advantages of identity-based systems and key-insulated ones, in this paper, we propose the first novel identity-based key-insulated CAE (IB-KICAE) scheme from pairings. Integrating with key-insulated systems, our scheme can effectively mitigate the impact caused by key exposure, as each user can periodically update his private key while the corresponding public one remains unchanged. The proposed scheme is conversion-free and supports unbounded time periods and random-access key-updates. Moreover, to guarantee its practical feasibility, the essential security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and that of unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA) are realized in the random oracle model.


2015 ◽  
Vol 21 (3) ◽  
pp. 433-443 ◽  
Author(s):  
Yi Jiang ◽  
Jianping Li ◽  
Anping Xiong

2019 ◽  
Vol 1302 ◽  
pp. 022015
Author(s):  
Xiaodong Yang ◽  
Chunlin Chen ◽  
Tingchun Ma ◽  
Yutong Li ◽  
Likun Xiao

Author(s):  
William Krakow

In the past few years on-line digital television frame store devices coupled to computers have been employed to attempt to measure the microscope parameters of defocus and astigmatism. The ultimate goal of such tasks is to fully adjust the operating parameters of the microscope and obtain an optimum image for viewing in terms of its information content. The initial approach to this problem, for high resolution TEM imaging, was to obtain the power spectrum from the Fourier transform of an image, find the contrast transfer function oscillation maxima, and subsequently correct the image. This technique requires a fast computer, a direct memory access device and even an array processor to accomplish these tasks on limited size arrays in a few seconds per image. It is not clear that the power spectrum could be used for more than defocus correction since the correction of astigmatism is a formidable problem of pattern recognition.


Author(s):  
A.M.H. Schepman ◽  
J.A.P. van der Voort ◽  
J.E. Mellema

A Scanning Transmission Electron Microscope (STEM) was coupled to a small computer. The system (see Fig. 1) has been built using a Philips EM400, equipped with a scanning attachment and a DEC PDP11/34 computer with 34K memory. The gun (Fig. 2) consists of a continuously renewed tip of radius 0.2 to 0.4 μm of a tungsten wire heated just below its melting point by a focussed laser beam (1). On-line operation procedures were developped aiming at the reduction of the amount of radiation of the specimen area of interest, while selecting the various imaging parameters and upon registration of the information content. Whereas the theoretical limiting spot size is 0.75 nm (2), routine resolution checks showed minimum distances in the order 1.2 to 1.5 nm between corresponding intensity maxima in successive scans. This value is sufficient for structural studies of regular biological material to test the performance of STEM over high resolution CTEM.


Author(s):  
Neil Rowlands ◽  
Jeff Price ◽  
Michael Kersker ◽  
Seichi Suzuki ◽  
Steve Young ◽  
...  

Three-dimensional (3D) microstructure visualization on the electron microscope requires that the sample be tilted to different positions to collect a series of projections. This tilting should be performed rapidly for on-line stereo viewing and precisely for off-line tomographic reconstruction. Usually a projection series is collected using mechanical stage tilt alone. The stereo pairs must be viewed off-line and the 60 to 120 tomographic projections must be aligned with fiduciary markers or digital correlation methods. The delay in viewing stereo pairs and the alignment problems in tomographic reconstruction could be eliminated or improved by tilting the beam if such tilt could be accomplished without image translation.A microscope capable of beam tilt with simultaneous image shift to eliminate tilt-induced translation has been investigated for 3D imaging of thick (1 μm) biologic specimens. By tilting the beam above and through the specimen and bringing it back below the specimen, a brightfield image with a projection angle corresponding to the beam tilt angle can be recorded (Fig. 1a).


Author(s):  
G.Y. Fan ◽  
J.M. Cowley

In recent developments, the ASU HB5 has been modified so that the timing, positioning, and scanning of the finely focused electron probe can be entirely controlled by a host computer. This made the asynchronized handshake possible between the HB5 STEM and the image processing system which consists of host computer (PDP 11/34), DeAnza image processor (IP 5000) which is interfaced with a low-light level TV camera, array processor (AP 400) and various peripheral devices. This greatly facilitates the pattern recognition technique initiated by Monosmith and Cowley. Software called NANHB5 is under development which, instead of employing a set of photo-diodes to detect strong spots on a TV screen, uses various software techniques including on-line fast Fourier transform (FFT) to recognize patterns of greater complexity, taking advantage of the sophistication of our image processing system and the flexibility of computer software.


Sign in / Sign up

Export Citation Format

Share Document