军事学 >>> 军事学
搜索结果: 1-11 共查到军事学 zero knowledge proof相关记录11条 . 查询时间(0.07 秒)
Noninteractive Zero Knowledge Proof System for NP from Ring LWE     zero knowledge  MSIS       font style='font-size:12px;'> 2019/8/30
A hash function family is called correlation intractable if for all sparse relations, it hard to find, given a random function from the family, an input output pair that satisfies the relation. Correl...
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems     snark  stark  bulletproofs       font style='font-size:12px;'> 2019/5/13
The area of practical proof systems, like SNARKs, STARKs, or Bulletproofs, is seeing a very dynamic development. Many use-cases of such systems involve, often as their most expensive apart, proving th...
Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems     snark  stark  bulletproofs       font style='font-size:12px;'> 2019/5/13
The area of practical proof systems, like SNARKs, STARKs, or Bulletproofs, is seeing a very dynamic development. Many use-cases of such systems involve, often as their most expensive apart, proving th...
DIZK: A Distributed Zero Knowledge Proof System     zero knowledge proofs  cluster computing  SNARKs       font style='font-size:12px;'> 2018/7/20
Recently there has been much academic and industrial interest in practical implementations of *zero knowledge proofs*. These techniques allow a party to *prove* to another party that a given statement...
In 2006, Groth, Ostrovsky and Sahai designed one non-interactive zero-knowledge (NIZK) proof system [new version, J. ACM, 59(3), 1-35, 2012] for plaintext being zero or one using bilinear groups with ...
Zero-knowledge proofs of knowledge and fully-homomorphic encryption are two areas that have seen considerable advances in recent years, and these two techniques are used in conjunction in the context ...
Universally Composable Zero-Knowledge Proof of Membership     UC  zero-knowledge       font style='font-size:12px;'> 2017/4/27
Since its introduction the UC framework by Canetti has received a lot of attention. A contributing factor to its popularity is that it allows to capture a large number of common cryptographic primitiv...
Practical anonymous credential systems are generally built around sigma-protocol ZK proofs. This requires that credentials be based on specially formed signatures. Here we ask whether we can instead...
Watrous (STOC 2006) proved that plugging classical bit commitment scheme that is secure against quantum attack into the GMW-type construction of zero-knowledge gives a classical zero-knowledge proof...
This paper introduces a new intractable security problem whose intractability is due to the NP completeness of multivariate quadratic problem. This novel problem uses quaternion algebra in conjuncti...
Blum integers (BL), which has extensively been used in the domain of cryptography, are integers with form pk1qk2 , where p and q are di®erent primes both ´ 3 mod 4 and k1 and k2 are odd in...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...