搜索结果: 1-5 共查到“军队指挥学 Protocol Design”相关记录5条 . 查询时间(0.109 秒)
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin
Blockchain Protocols Rational Protocol Design Bitcoin
font style='font-size:12px;'>
2018/2/8
An exciting recent line of work has focused on formally investigating the core cryptographic assumptions underlying the security of Bitcoin. In a nutshell, these works conclude that Bitcoin is secure ...
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
universal composability commitments attribute tokens
font style='font-size:12px;'>
2016/6/7
Complex cryptographic protocols are often designed from simple cryptographic primitives, such as signature schemes, encryption schemes, verifiable random functions, and zero-knowledge proofs, by bridg...
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design
key exchange constructive cryptography
font style='font-size:12px;'>
2014/3/10
Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is us...
Rational Protocol Design: Cryptography Against Incentive-driven Adversaries
Cryptographic Protocols Game Theory Secure Computation Composition
font style='font-size:12px;'>
2014/3/10
Existing work on “rational cryptographic protocols” treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundam...
Signing on Elements in Bilinear Groups for Modular Protocol Design
Digital Signatures Modular Protocol Design Groth-Sahai Proofs Blind Signatures Group Signatures
font style='font-size:12px;'>
2010/3/16
This paper addresses the construction of signature schemes whose verification keys, messages,
and signatures are group elements and the verification predicate is a conjunction of
pairing product equ...