期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
How an All-or-Nothing insurance behaviour challenges economic policies:an experimental approach
1
作者 Anne Corcos François Pannequin Claude Montmarquette 《Economic and Political Studies》 2021年第1期4-16,共13页
Based on experimental data,this paper confirms,in a controlled environment,converging theoretical and empirical results that,when individuals insure,they choose to insure themselves with a full cover.This insurance be... Based on experimental data,this paper confirms,in a controlled environment,converging theoretical and empirical results that,when individuals insure,they choose to insure themselves with a full cover.This insurance behaviour creates an opportunity for the public authority to drive people to enter the insurance market where they would buy full insurance.This paper also sheds light on the risks of an opportunistic insurers’behaviour.This heuristic challenges the efficiency of separating contracts designed to address adverse selection issues.Indeed,a strong preference for full contracts may encourage low-risk individuals to turn to(full)contracts designed for high-risk individuals,yielding advantageous selection opportunities for insurers.However,if this heuristic strengthens the high-risks’reluctance for partial insurance,it may increase the efficiency of the separating contracts,and the lowrisk individuals suffer less from adverse selection. 展开更多
关键词 Experimental study all-or-nothing(AoN)insurance decision public policies
原文传递
云存储中一种抗窃听攻击的弱安全再生码
2
作者 刘建 王会梅 +1 位作者 鲜明 黄昆 《电子与信息学报》 EI CSCD 北大核心 2014年第5期1221-1228,共8页
纠删码和再生码是保证云存储可靠性的有效机制,但是它们并不能提供节点被窃听情况下存储数据的机密性。该文设计了两类抗窃听攻击的弱安全再生码方案,方案结合All-or-Nothing变换与精确修复再生码策略,保证了攻击者在窃听能力有限的情... 纠删码和再生码是保证云存储可靠性的有效机制,但是它们并不能提供节点被窃听情况下存储数据的机密性。该文设计了两类抗窃听攻击的弱安全再生码方案,方案结合All-or-Nothing变换与精确修复再生码策略,保证了攻击者在窃听能力有限的情况下无法获取关于原始数据符号的任何有意义信息,同时具有较小的数据修复带宽。该文给出了通用编码构造方法,证明了其安全性,并通过实验进行了对比分析,结果表明与其它安全再生码相比该方案的编解码时间更短,且具有更好的秘密数据存储能力。 展开更多
关键词 云存储 再生码 安全 窃听 all-or-nothing变换
下载PDF
An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update 被引量:1
3
作者 Changji Wang Yuan Yuan 《Computers, Materials & Continua》 SCIE EI 2020年第5期1031-1041,共11页
Ciphertext-policy attribute-based encryption(CP-ABE)is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the cloud.However,when applying CP-ABE to data ... Ciphertext-policy attribute-based encryption(CP-ABE)is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the cloud.However,when applying CP-ABE to data outsourcing scenarios,we have to address the challenging issue of policy updates because access control elements,such as users,attributes,and access rules may change frequently.In this paper,we propose a notion of access policy updatable ciphertext-policy attribute-based encryption(APU-CP-ABE)by combining the idea of ciphertext-policy attribute-based key encapsulation and symmetric proxy re-encryption.When an access policy update occurs,data owner is no longer required to download any data for re-encryption from the cloud,all he needs to do is generate a re-encryption key and produce a new encapsulated symmetric key,and then upload them to the cloud.The cloud server executes re-encryption without decryption.Because the re-encrypted ciphertext is encrypted under a completely new key,users cannot decrypt data even if they keep the old symmetric keys or parts of the previous ciphertext.We present an APU-CP-ABE construction based on Syalim et al.’s[Syalim,Nishide and Sakurai(2017)]improved symmetric proxy re-encryption scheme and Agrawal et al.’s[Agrawal and Chase(2017)]attribute-based message encryption scheme.It requires only 6 bilinear pairing operations for decryption,regardless of the number of attributes involved.This makes our construction particularly attractive when decryption is time-critical. 展开更多
关键词 Ciphertext-policy attribute-based encryption key encapsulation mechanism access structure all-or-nothing transform cloud computing
下载PDF
抗窃听的安全网络编码 被引量:10
4
作者 罗明星 杨义先 +1 位作者 王励成 钮心忻 《中国科学:信息科学》 CSCD 2010年第2期371-380,共10页
文中构造信息论意义下的安全网络编码以抗窃听攻击.基于广义攻击模型和all-or-nothing变换,构造广义组合网络上的安全网络编码,其安全性由网络容量和窃听集的最小割共同决定.进而,此结论被推广到任意单信源有向无圈网络.与已有结论相比... 文中构造信息论意义下的安全网络编码以抗窃听攻击.基于广义攻击模型和all-or-nothing变换,构造广义组合网络上的安全网络编码,其安全性由网络容量和窃听集的最小割共同决定.进而,此结论被推广到任意单信源有向无圈网络.与已有结论相比,这种安全网络编码无额外加密开销,也无传输容量损失. 展开更多
关键词 all-or-nothing变换 安全网络编码 窃听
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部