A blind decryption scheme enables a user to query decryptions from a decryption server without revealing information about the plain-text message.Such schemes are useful, for example, for the implementation of privacy-preserving encrypted file storages and payment systems.In terms of functionality, blind decryption is close to oblivious transfer.Fo
A New Sequential Surrogate Method for Reliability Analysis and its Applications in Engineering
In reliability analysis for the practical engineering problems with the time-consuming model, it has become an important challenge that how to obtain accurate reliability assessment with a minimum number of calls.In order to reduce the computational cost, this paper develops a new sequential surrogate method combining adaptive kriging and Markov ch
Transcriptome and H3K27 tri-methylation profiling of Ezh2-deficient lung epithelium
The adaptation of the lungs to air breathing at birth requires the fine orchestration of different processes to control lung morphogenesis and progenitor cell differentiation.However, there is little understanding of the role that epigenetic modifiers play in the control COLOR PROTECTION SHAMPOO of lung development.We found that the histone methyl