搜索结果: 1-15 共查到“军事学 SMART-T”相关记录82条 . 查询时间(0.109 秒)
ETHDKG: Distributed Key Generation with Ethereum Smart Contracts
Distributed Key Generation DKG Ethereum
font style='font-size:12px;'>
2019/8/30
Distributed key generation (DKG) is a fundamental building block for a variety of cryptographic schemes and protocols, such as threshold cryptography, multi-party coin tossing schemes, public randomne...
The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains
blockchain forks smart contracts secure computation
font style='font-size:12px;'>
2019/8/6
We investigate the security of smart contracts within a blockchain that can fork (as Bitcoin and Ethereum). In particular, we focus on multi-party computation (MPC) protocols run on-chain with the aid...
A Blockchain-Based Access Control Scheme for Smart Grids
smart grids access control blockchain
font style='font-size:12px;'>
2019/8/2
At present, the access control schemes in the power grid are centralized. In the centralized system, the data of the network sensor nodes is transmitted by centralized nodes, and the data itself may b...
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies
Blockchain Smart Contracts Cryptocurrency
font style='font-size:12px;'>
2019/7/24
In contrast to traditional contracts, cryptocurrency-based smart contracts can provide improved business automation and more transparency. However, not all cryptocurrencies support expressive contract...
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
Blockchain Smart Contracts Cryptocurrency
font style='font-size:12px;'>
2019/7/22
Smart contracts are programmable, decentralized and transparent financial applications. Because smart contract platforms typically support Turing-complete programming languages, such systems are often...
A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement
blockchain collateral decentralized ledger
font style='font-size:12px;'>
2019/5/23
We present a protocol for a cryptoeconomic fair exchange of data previously owned by the purchaser for tokens that functions even when both parties are anonymous. This enables peer-to-peer data storag...
On the Efficiency of Privacy-Preserving Smart Contract Systems
privacy-preserving smart contracts zk-SNARKs UC-security
font style='font-size:12px;'>
2019/5/14
Along with blockchain technology, smart contracts have found intense interest in lots of practical applications. A smart contract is a mechanism involving digital assets and some parties, where the pa...
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Privacy anonymous credentials authentication
font style='font-size:12px;'>
2019/5/13
Cryptographic anonymous credential schemes allow users to prove their personal attributes, such as age, nationality, or the validity of a ticket or a pre-paid pass, while preserving their privacy, as ...
Zether: Towards Privacy in a Smart Contract World
blockchain zero knowledge
font style='font-size:12px;'>
2019/3/1
Blockchain-based smart contract platforms like Ethereum have become quite popular as a way to remove trust and add transparency to distributed applications. While different types of important applicat...
FastKitten: Practical Smart Contracts on Bitcoin
Blockchain Bitcoin Smart Contracts
font style='font-size:12px;'>
2019/2/25
Smart contracts are envisioned to be one of the killer applications of decentralized cryptocurrencies. They enable self-enforcing payments between users depending on complex program logic. Unfortunate...
Senopra: Reconciling Data Privacy and Utility via Attested Smart Contract Execution
KAC key management
font style='font-size:12px;'>
2019/1/4
The abundance of smart devices and sensors has given rise to an unprecedented large-scale data collection. While this benefits various data-driven application domains, it raises numerous security and ...
Keeping Time-Release Secrets through Smart Contracts
Time-Release Secrets Smart Contracts
font style='font-size:12px;'>
2018/12/3
A time-release protocol enables one to send secrets into a future release time. The main technical challenge lies in incorporating timing control into the protocol, especially in the absence of a cent...
Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure
public key infrastracture accumulators
font style='font-size:12px;'>
2018/11/15
Public-key infrastructures (PKIs) are an integral part of the security foundations of digital communications. Their widespread deployment has allowed the growth of important applications, such as, int...
Forward Secure Signatures on Smart Cards
hash-based signatures forward secure signatures smart cards
font style='font-size:12px;'>
2018/11/8
We introduce the forward secure signature scheme XMSS++ and present an implementation for smart cards. It is based on the hash-based signature scheme XMSS. In contrast to the only previous implementat...
Automated Penalization of Data Breaches using Crypto-augmented Smart Contracts
Data leakage Oblivious transfer Smart Contracts
font style='font-size:12px;'>
2018/11/2
This work studies the problem of automatically penalizing intentional or unintentional data breach (APDB) by a receiver/custodian receiving confidential data from a sender. We solve this problem by au...