ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
0
views
35
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,561
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
other
Author(s):
Goichiro Hanaoka
,
Misaki Komatsu
,
Kazuma Ohara
,
Yusuke Sakai
,
Shota Yamada
Publication date
(Online):
September 13 2020
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Semantic Knowledge Base
Most cited references
35
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
328
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Encryption from the Weil Pairing
Dan Boneh
,
Matt Franklin
(2001)
0
comments
Cited
128
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Probabilistic encryption
Shafi Goldwasser
,
Silvio Micali
(1984)
0
comments
Cited
123
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2020
Publication date (Online):
September 13 2020
Pages
: 65-85
DOI:
10.1007/978-3-030-59013-0_4
SO-VID:
706adad0-d5c6-4165-bb38-c3fb75b6e361
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols
pp. 3
Neuroevolutionary Feature Representations for Causal Inference
pp. 11
Compiling Linear Algebra Expressions into Efficient Code
pp. 23
When Is a Test Not a Proof?
pp. 18
Interval Modification of the Fast PIES in Solving 2D Potential BVPs with Uncertainly Defined Polygonal Boundary Shape
pp. 42
Hardware Fingerprinting for the ARINC 429 Avionic Bus
pp. 26
Validation and Optimisation of Player Motion Models in Football
pp. 65
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
pp. 33
Auto-scaling of Scientific Workflows in Kubernetes
pp. 86
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval
pp. 107
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
pp. 41
Transfer Learning Based Natural Scene Classification for Scene Understanding by Intelligent Machines
pp. 131
Linear Attack on Round-Reduced DES Using Deep Learning
pp. 49
Devulgarization of Polish Texts Using Pre-trained Language Models
pp. 146
Detection by Attack: Detecting Adversarial Samples by Undercover Attack
pp. 56
Data-Driven Discovery of Time Fractional Differential Equations
pp. 165
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems
pp. 64
Wide Ensembles of Neural Networks in Music Genre Classification
pp. 185
Active Re-identification Attacks on Periodically Released Dynamic Social Graphs
pp. 72
MultiEmo: Language-Agnostic Sentiment Analysis
pp. 209
Fooling Primality Tests on Smartcards
pp. 80
Particle Swarm Optimization Configures the Route Minimization Algorithm
pp. 230
An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA
pp. 88
Practical Aspects of Zero-Shot Learning
pp. 251
On the Privacy Risks of Compromised Trigger-Action Platforms
pp. 96
A Hypothetical Agent-Based Model Inspired by the Abstraction of Solitary Behavior in Tigers and Its Employment as a Chain Code for Compression
pp. 103
Analyzing the Usefulness of Public Web Camera Video Sequences for Calibrating and Validating Pedestrian Dynamics Models
pp. 272
Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces
pp. 110
A Highly Customizable Information Visualization Framework
pp. 295
Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication
pp. 117
Incremental Dynamic Analysis and Fragility Assessment of Buildings with Different Structural Arrangements Experiencing Earthquake-Induced Structural Pounding
pp. 317
CSH: A Post-quantum Secret Handshake Scheme from Coding Theory
pp. 125
PIES with Trimmed Surfaces for Solving Elastoplastic Boundary Problems
pp. 336
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing
pp. 132
Linear Computational Cost Implicit Variational Splitting Solver with Non-regular Material Data for Parabolic Problems
pp. 357
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
pp. 139
A Hadamard Matrix-Based Algorithm to Evaluate the Strength of Binary Sequences
pp. 378
Post-Quantum Adaptor Signatures and Payment Channel Networks
pp. 146
Private and Public Opinions in a Model Based on the Total Dissonance Function: A Simulation Study
pp. 401
Linear-Complexity Private Function Evaluation is Practical
pp. 154
Analysis of Public Transport (in)accessibility and Land-Use Pattern in Different Areas in Singapore
pp. 421
Certifying Decision Trees Against Evasion Attacks by Program Analysis
pp. 162
Pseudo-Newton Method with Fractional Order Derivatives
pp. 439
They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization
pp. 169
An Energy Aware Clustering Scheme for 5G-Enabled Edge Computing Based IoMT Framework
pp. 460
Understanding Object Detection Through an Adversarial Lens
pp. 177
A Framework for Network Self-evolving Based on Distributed Swarm Intelligence
pp. 485
Signatures with Tight Multi-user Security from Search Assumptions
pp. 184
Investigating an Optimal Computational Strategy to Retrofit Buildings with Implementing Viscous Dampers
pp. 505
Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys
pp. 192
ARIMA Feature-Based Approach to Time Series Classification
pp. 525
MAC-in-the-Box: Verifying a Minimalistic Hardware Design for MAC Computation
pp. 200
A Note on Adjoint Linear Algebra
pp. 546
Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE
pp. 207
Approximate Function Classification
pp. 569
How to Model the Bribery Attack: A Practical Quantification Method in Blockchain
pp. 214
Acceleration of Optimized Coarse-Grid Operators by Spatial Redistribution for Multigrid Reduction in Time
pp. 590
Updatable Blockchains
pp. 222
Networks Clustering-Based Approach for Search of Reservoirs-Analogues
pp. 610
PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution
pp. 229
KP01 Solved by an n-Dimensional Sampling and Clustering Heuristic
pp. 633
Identity-Based Authenticated Encryption with Identity Confidentiality
pp. 237
A Deep Neural Network as a TABU Support in Solving LABS Problem
pp. 654
Securing DNSSEC Keys via Threshold ECDSA from Generic MPC
pp. 244
Classification and Generation of Derivational Morpho-semantic Relations for Polish Language
pp. 674
On Private Information Retrieval Supporting Range Queries
pp. 252
On the Explanation of AI-Based Student Success Prediction
pp. 697
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely
pp. 713
Generic Superlight Client for Permissionless Blockchains
pp. 266
Phase-Field Modelling of Brittle Fracture Using Time-Series Forecasting
pp. 734
LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network for Fun and Profit
pp. 277
Calculation of Cross-correlation Function Accelerated by Tensor Cores with TensorFloat-32 Precision on Ampere GPU
pp. 291
Developing an ELM Ecosystem Dynamics Model on GPU with OpenACC
pp. 307
Optimization-Free Inverse Design of High-Dimensional Nanoparticle Electrocatalysts Using Multi-target Machine Learning
pp. 319
CNNs with Compact Activation Function
pp. 328
Deep Neural Networks and Smooth Approximation of PDEs
pp. 333
Isogeometric Analysis of Bound States of a Quantum Three-Body Problem in 1D
pp. 347
1D Painless Multi-level Automatic Goal-Oriented h and p Adaptive Strategies Using a Pseudo-Dual Operator
pp. 358
Transfer Learning Approach to Prediction of Rate of Penetration in Drilling
pp. 372
Physics Informed RNN-DCT Networks for Time-Dependent Partial Differential Equations
pp. 380
Recursive Singular Value Decomposition Compression of Refined Isogeometric Analysis Matrices as a Tool to Speedup Iterative Solvers Performance
pp. 394
Neural-Network Based Adaptation of Variation Operators’ Parameters for Metaheuristics
pp. 408
Performance of Computing Hash-Codes with Chaotically-Trained Artificial Neural Networks
pp. 422
Application of the Hierarchic Memetic Strategy HMS in Neuroevolution
pp. 433
CXR-FL: Deep Learning-Based Chest X-ray Image Analysis Using Federated Learning
pp. 441
POTHER: Patch-Voted Deep Learning-Based Chest X-ray Bias Analysis for COVID-19 Detection
pp. 455
Modeling Contrast Perfusion and Adsorption Phenomena in the Human Left Ventricle
pp. 469
Dense Temporal Subgraphs in Protein-Protein Interaction Networks
pp. 481
Accelerating Edge Metagenomic Analysis with Serverless-Based Cloud Offloading
pp. 493
Continuous-to-Continuous Data Model vs. Discrete-to-Discrete Data Model for the Statistical Iterative Reconstruction Method
pp. 507
Musculoskeletal Model of Human Lower Limbs in Gait Simulation
pp. 514
Tissue Damage Control Algorithm for Hyperthermia Based Cancer Treatments
pp. 526
Resting-State EEG Classification for PNES Diagnosis
pp. 539
Machine Learning Approaches in Inflammatory Bowel Disease
pp. 546
A Machine Learning Framework for Fetal Arrhythmia Detection via Single ECG Electrode
pp. 557
Consensus Algorithm for Bi-clustering Analysis
pp. 571
Collective of Base Classifiers for Mining Imbalanced Data
pp. 586
Impact of Clustering on a Synthetic Instance Generation in Imbalanced Data Streams Classification
pp. 598
Enhancing Decision Combination in Classifier Committee via Positional Voting
pp. 610
Competition and Cooperation Mechanisms for Collective Behavior in Large Multi-agent Systems
pp. 624
Divergence of an Observed User Profile and a Simulated Real State of User Due to Social Communication
pp. 638
Temporal-Attribute Inference Using Dynamic Bayesian Networks
pp. 653
Fuzzy Logic Framework for Ontology Instance Alignment
pp. 667
Neuro-Symbolic Models for Sentiment Analysis
pp. 682
A Unified Sense Inventory for Word Sense Disambiguation in Polish
pp. 690
Sentence-level Sentiment Analysis Using GCN on Contextualized Word Representations
pp. 703
Machine Learning for Bus Travel Prediction
pp. 711
Prediction of Ether Prices Using DeepAR and Probabilistic Forecasting
pp. 719
Purchasing Decisions on Alternative Fuel Vehicles Within an Agent-Based Model
Similar content
5,561
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
Authors:
Sanjam Garg
,
Craig Gentry
,
Shai Halevi
…
Blockchain-based RBAC for user authentication with anonymity
Authors:
Efficient and anonymous multi-message and multi-receiver electronic health records sharing scheme without secure channel based on blockchain
Authors:
X. yang
,
X. Li
,
T LI
…
See all similar