搜索结果: 1-15 共查到“知识库 public”相关记录1154条 . 查询时间(0.062 秒)
《International Journal of Public Health》:The Association Between Sexual Harassment and Mental Health Among Chinese College Students: Do Gender and Social Support Matter?
Public Health college students harassment (SH)
2023/12/7
雷速公司共建数据
This study examined the association between sexual harassment (SH) and college students' mental health in the Chinese context and its gender differences, exploring the moderating role of social suppor...

华中农业大学公共管理学院开设“Public Policy in Stories. Stories in Public Policy”暑期全英文课程(图)
华中农业大学 公共管理学院 暑期全英文课程
2022/9/8
2022年8月15日至31日,香港教育大学亚洲及政策研究学系副教授(长聘)、副系主任,新加坡国立大学李光耀公共政策学院公共政策博士和经纬老师以“Public Policy in Stories. Stories in Public Policy”为主题,为华中农业大学公共管理学院学生开设了暑期全英文课程。和经纬老师主要研究专长为医疗卫生政策、社会政策改革和公共政策分析,尤其关注东亚地区的政策改革。...
A New Public Key Cryptosystem Based on Edwards Curves
Elliptic curves Twisted Edwards curves RSA cryptosystem
2019/9/19
The elliptic curve cryptography plays a central role in various cryptographic schemes and protocols. For efficiency reasons, Edwards curves and twisted Edwards curves have been introduced. In this pap...
Simple and Efficient KDM-CCA Secure Public Key Encryption
key dependent message security chosen ciphertext security
2019/9/16
We propose two efficient public key encryption (PKE) schemes satisfying key dependent message security against chosen ciphertext attacks (KDM-CCA security). The first one is KDM-CCA secure with respec...
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
public-key cryptography Rand-RCCA PKE
2019/8/22
Re-randomizable RCCA-secure public key encryption (Rand-RCCA PKE) schemes reconcile the property of re-randomizability of the ciphertexts with the need of security against chosen-ciphertexts attacks.
Towards a Hybrid Public Key Infrastructure (PKI): A Review
Certificate-based PKI Identity-based public key cryptography (ID-PKC) Hybrid PKI
2019/7/15
Traditional Certificate-based public key infrastructure (PKI) suffers from the problem of certificate overhead like its storage, verification, revocation etc. To overcome these problems, the idea of c...
DDH-based Multisignatures with Public Key Aggregation
Multisignatures Decisional Diffie-Hellman assumption Blockchain
2019/7/8
A multisignature scheme allows a group of signers to produce a joint signature on a common message, which is more compact than a collection of distinct signatures from all signers. Given this signatur...
Public-Key Function-Private Hidden Vector Encryption (and More)
function privacy obfuscation conjunctions
2019/6/26
Conjunctions. If the predicate computes a conjunction, our construction is a public-key function-private hidden vector encryption scheme. This addresses an open problem posed by Boneh, Raghunathan, an...
Public Ledger for Sensitive Data
Privacy-Preserving Ledger Blockchain End to End Encryption
2019/6/19
In this work an original protocol is presented that allows sensitive data to be stored on a ledger where its integrity may be publicly verified, but its privacy is preserved and owners can tightly man...
Homomorphism learning problems and its applications to public-key cryptography
Learning With Errors isogenies non-commutative cryptography
2019/6/19
We present a framework for the study of a learning problem over abstract groups, and introduce a new technique which allows for public-key encryption using generic groups. We proved, however, that in ...
Public-Key Cryptography in the Fine-Grained Setting
Fine-grained Public-Key One-Way-Function
2019/6/4
Cryptography is largely based on unproven assumptions, which, while believable, might fail. Notably if P=NPP=NP, or if we live in Pessiland, then all current cryptographic assumptions will be broken. ...
A software watermarking scheme enables users to embed a message or mark within a program while preserving its functionality. Moreover, it is difficult for an adversary to remove a watermark from a mar...
Pseudorandom functions are traditionally built upon block ciphers, but with the trend of permutation based cryptography, it is a natural question to investigate the design of pseudorandom functions fr...
Non-malleability for quantum public-key encryption
public-key cryptography non-malleability quantum cryptography
2019/5/21
Non-malleability is an important security property for public-key encryption (PKE). Its significance is due to the fundamental unachievability of integrity and authenticity guarantees in this setting,...
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
Post-quantum cryptography public-key compression supersingular elliptic curves
2019/5/21
The isogeny-based protocols SIDH and SIKE have received much attention for being post-quantum key agreement candidates that retain relatively small keys. A recent line of work has proposed and further...