搜索结果: 1-9 共查到“军事学 Transparent”相关记录9条 . 查询时间(0.066 秒)
Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity
polynomial commitments zero-knowledge proofs proximity testing
2019/9/16
We introduce novel efficient and transparent construction of the polynomial commitment scheme. A polynomial commitment scheme allows one side (the prover) to commit to a polynomial of predefined degre...
Aurora: Transparent Succinct Arguments for R1CS
zero knowledge interactive oracle proofs succinct arguments
2018/11/16
We design, implement, and evaluate a zero knowledge succinct non-interactive argument (SNARG) for Rank-1 Constraint Satisfaction (R1CS), a widely-deployed NP language undergoing standardization. Our S...
Scalable, transparent, and post-quantum secure computational integrity
zero knowledge computational integrity blockchains
2018/1/11
Human dignity demands that personal information, like medical and forensic data, be hidden from the public. But veils of secrecy designed to preserve privacy may also be abused to cover up lies and de...
Secure Storage with Replication and Transparent Deduplication
replication storage integrity deduplication
2017/8/2
We seek to answer the following question: To what extent can we deduplicate replicated storage? To answer this question, we design ReDup, a secure storage system that provides users with strong integr...
Security features of modern (SoC) FPAGs permit to protect the confidentiality of hard- and software IP when the devices are powered off as well as to validate the authenticity of IP when being loaded ...
Efficient Transparent Redactable Signatures with a Single Signature Invocation
transparent redactable signatures digital signatures combinatorial cryptography
2016/12/29
A redactable signature scheme is one that allows the original signature to be used, usually
along with some additional data, to verify certain carefully specified changes to the original document
th...
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
zero knowledge trusted hardware cryptocurrency
2016/6/22
Trusted hardware systems, such as Intel's new SGX instruction set architecture extension, aim to provide strong confidentiality and integrity assurances for applications. Recent work, however, raises ...
Selene: Voting with Transparent Verifiability and Coercion-Mitigation
applications Election Schemes
2015/12/21
End-to-end verifiable voting schemes typically involves voters
handling an encrypted ballot in order to confirm that their vote is
accurately included in the tally. While this may be technically val...
Transparent, Distributed, and Replicated Dynamic Provable Data Possession
Secure cloud storage provable data possession
2014/3/13
With the growing trend toward using outsourced storage, the problem of efficiently checking and proving data integrity needs more consideration. Starting with PDP and POR schemes in 2007, many cryptog...