scispace - formally typeset
Search or ask a question
Topic

Proxy (statistics)

About: Proxy (statistics) is a research topic. Over the lifetime, 5257 publications have been published within this topic receiving 94504 citations. The topic is also known as: proxy variable & proxy measurement.


Papers
More filters
Book ChapterDOI
04 Sep 2009
TL;DR: Wang et al. as discussed by the authors re-formalize more rigorous definition and security notions for conditional proxy re-encryption (C-PRE) and prove its chosen-ciphertext security under the decisional bilinear Diffie-Hellman (DBDH) assumption in the random oracle model.
Abstract: Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus is more useful in many applications. In this paper, based on a careful observation on the existing definitions and security notions for C-PRE, we re-formalize more rigorous definition and security notions for C-PRE. We further propose a more efficient C-PRE scheme, and prove its chosen-ciphertext security under the decisional bilinear Diffie-Hellman (DBDH) assumption in the random oracle model. In addition, we point out that a recent C-PRE scheme fails to achieve the chosen-ciphertext security.

81 citations

Journal ArticleDOI
TL;DR: In this article, the authors examine the association between employee quality and financial reporting outcomes and find that firms with a high-quality workforce exhibit higher accruals quality, fewer internal control violations, and fewer restatements.

80 citations

Journal ArticleDOI
TL;DR: This letter proposes an identity-based signature scheme without bilinear pairings that is more practical than the previous related schemes for practical application and saves the running time and the size of the signature.
Abstract: The proxy signature schemes allow proxy signers to sign messages on behalf of an original signer, a company, or an organization. Such schemes have been suggested for use in a number of applications, particularly in distributed computing, where delegation of rights is quite common. Many identity-based proxy signature schemes using bilinear pairings have been proposed. But the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to save the running time and the size of the signature, in this letter, we propose an identity-based signature scheme without bilinear pairings. With the running time being saved greatly, our scheme is more practical than the previous related schemes for practical application.

80 citations

Patent
10 Jan 2002
TL;DR: In this article, a request for secure data sent from a client computer 2 to a webtsite server computer 4 is redirected to a proxy computer 6 using a protocol such as HTTP and Certificate Exchange.
Abstract: A request for secure data sent from a client computer 2 to a webtsite server computer 4 is redirected to a proxy computer 6 . A secure connection is established with the proxy computer 6 using a protocol such as HTTP and Certificate Exchange. The proxy computer 6 then establishes its own secure connection with the website server 4 . The data requested is passed in encrypted form from the website server computer 4 to the proxy computer 6 . The proxy computer 6 decrypts this data and then scans it for illegal content, such as computer viruses, worms, Trojans, banned computer files, banned words, banned combinations of words or banned images and the like. Providing no illegal content is found, the data is encrypted again for transfer over the secure link between the proxy computer 6 and the client computer 2 . The proxy computer 6 may conveniently be the firewall computer within a local area network.

79 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20231,242
20222,473
2021334
2020262
2019250
2018282