咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 10 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23 篇 工学
    • 23 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 4 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 电子科学与技术(可...
  • 12 篇 理学
    • 12 篇 数学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 公共管理

主题

  • 25 篇 zero-knowledge p...
  • 4 篇 authentication
  • 3 篇 code-based crypt...
  • 3 篇 coding theory
  • 3 篇 cryptography
  • 2 篇 cfs signature
  • 2 篇 stern sd scheme
  • 2 篇 security
  • 2 篇 fiat-shamir heur...
  • 2 篇 cryptographic pr...
  • 1 篇 round complexity
  • 1 篇 lattice-based cr...
  • 1 篇 protokoly s nulo...
  • 1 篇 secure elections
  • 1 篇 zero-knowledge w...
  • 1 篇 passwords
  • 1 篇 interactive gene...
  • 1 篇 revocation
  • 1 篇 multos
  • 1 篇 public-key crypt...

机构

  • 2 篇 technion haifa
  • 2 篇 univ limoges lim...
  • 1 篇 inria
  • 1 篇 weizmann inst sc...
  • 1 篇 cuny ny usa
  • 1 篇 univ politecn ma...
  • 1 篇 inria le chesnay
  • 1 篇 deakin univ sch ...
  • 1 篇 ntt res sunnyval...
  • 1 篇 princeton univ p...
  • 1 篇 athens univ econ...
  • 1 篇 univ dusseldorf ...
  • 1 篇 visa res palo al...
  • 1 篇 nist comp secur ...
  • 1 篇 informat secur g...
  • 1 篇 islamic azad uni...
  • 1 篇 guilin univ elec...
  • 1 篇 islamic azad uni...
  • 1 篇 collaborat innov...
  • 1 篇 mit cambridge ma...

作者

  • 3 篇 gaborit philippe
  • 2 篇 rothblum ron d.
  • 2 篇 blazy olivier
  • 2 篇 lombardi alex
  • 2 篇 gennaro rosario
  • 2 篇 schrek julien
  • 2 篇 holmgren justin
  • 1 篇 xu yanhong
  • 1 篇 baum carsten
  • 1 篇 gritzalis d
  • 1 篇 craver scott
  • 1 篇 ouyang ying
  • 1 篇 assidi hafsa
  • 1 篇 sadeghi ar
  • 1 篇 wang jian
  • 1 篇 chen yilei
  • 1 篇 quisquater jean-...
  • 1 篇 adelsbach a
  • 1 篇 leverrier anthon...
  • 1 篇 nizzardo luca

语言

  • 23 篇 英文
  • 2 篇 其他
检索条件"主题词=Zero-Knowledge Protocols"
25 条 记 录,以下是1-10 订阅
排序:
Code-Based zero-knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller  30th
Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Ap...
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Ouyang, Ying Tang, Deng Xu, Yanhong Shanghai Jiao Tong Univ 800 Dongchuan Rd Shanghai 200240 Peoples R China
zero-knowledge (ZK) protocols allow a prover to demonstrate the truth of a statement without disclosing additional information about the underlying witness. Code-based cryptography has a long history but did suffer fr... 详细信息
来源: 评论
Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it
收藏 引用
MULTIMEDIA SYSTEMS 2005年 第2期11卷 143-158页
作者: Adelsbach, A Rohe, M Sadeghi, AR Ruhr Univ Bochum Horst Gortz Inst IT Secur D-44780 Bochum Germany
zero-knowledge Watermark Detection (ZKWMD) is a promising and powerful means to improve the security of digital watermarking schemes in the context of various copyright-protection applications: in contrast to standard... 详细信息
来源: 评论
Policy-based signature scheme from lattices
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2016年 第1期81卷 43-74页
作者: Cheng, Shantian Khoa Nguyen Wang, Huaxiong Nanyang Technol Univ Sch Phys & Math Sci Div Math Sci 21 Nanyang Link Singapore 637371 Singapore
Policy-based signature, introduced by Bellare and Fuchsbauer at PKC 2014, is a new type of digital signature in which a signer is only allowed to sign messages satisfying certain policy specified by the authority, but... 详细信息
来源: 评论
Some facets of complexity theory and cryptography: a five-lecture tutorial
收藏 引用
ACM COMPUTING SURVEYS 2002年 第4期34卷 504-549页
作者: Rothe, J Univ Dusseldorf Inst Informat D-40225 Dusseldorf Germany
In this tutorial, selected topics of cryptology and of computational complexity theory are presented. We give a brief overview of the history and the foundations of classical cryptography, and then move on to modern p... 详细信息
来源: 评论
Towards a formal system-to-system authentication protocol
收藏 引用
COMPUTER COMMUNICATIONS 1996年 第12期19卷 954-961页
作者: Gritzalis, D Katsikas, S ATHENS UNIV ECON & BUSINESS DEPT INFORMATGR-10434 ATHENSGREECE
The problem of system-to-system authentication with the use of a password can be effectively facilitated through the use of either a probabilistic protocol or a zero-knowledge model. A combination of these two into a ... 详细信息
来源: 评论
Secure sealed-bid online auctions using discreet cryptographic proofs
收藏 引用
MATHEMATICAL AND COMPUTER MODELLING 2013年 第11-12期57卷 2583-2595页
作者: Montenegro, Jose A. Fischer, Michael J. Lopez, Javier Peralta, Rene Univ Malaga ETSI Informat Malaga Dpto Lenguajes & Ciencias Comp E-29071 Malaga Spain Yale Univ Dept Comp Sci New Haven CT 06520 USA NIST Comp Secur Div Gaithersburg MD 20899 USA
This work describes the design and implementation of an auction system using secure multiparty computation techniques. Our aim is to produce a system that is practical under actual field constraints on computation, me... 详细信息
来源: 评论
Efficient authentication protocol with anonymity and key protection for mobile Internet users
收藏 引用
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING 2020年 第0期137卷 179-191页
作者: Jiang, Yan Zhu, Youwen Wang, Jian Xiang, Yong Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing 211106 Peoples R China Deakin Univ Sch Informat Technol Melbourne Vic 3125 Australia Collaborat Innovat Ctr Novel Software Technol & I Nanjing 210023 Peoples R China Guilin Univ Elect Technol Guangxi Key Lab Trusted Software Guilin 541004 Peoples R China
To preserve user privacy and guarantee data confidentiality on the mobile Internet, it is crucial to secure communication between the mobile devices held by users and a remote server. In real applications, a serious t... 详细信息
来源: 评论
Signature scheme with message recovery and its application
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 2004年 第3期81卷 285-289页
作者: Sekhar, MR Indian Stat Inst Appl Stat Unit Kolkata 108 India
Recently Chen, [K. Chen, Signature with message recovery, Electronics Letters , 34(20) (1998) 1934], proposed a signature with message recovery. But Mitchell and Yeun [C. J. Mitchell and C. Y. Yeun, Comment - signatur... 详细信息
来源: 评论
Locally random reductions: Improvements and applications
收藏 引用
JOURNAL OF CRYPTOLOGY 1997年 第1期10卷 17-36页
作者: Beaver, D Feigenbaum, J Kilian, J Rogaway, P AT&T BELL LABS MURRAY HILL NJ 07974 USA NEC RES INST PRINCETON NJ 08540 USA UNIV CALIF DAVIS DEPT COMP SCI DAVIS CA 95616 USA
A (t, n)-locally random reduction maps a problem instance x into a set of problem instances y(1), ..., y(n) in such a way that it is easy to construct the answer to x from the answers to y(1), ..., y(n), and yet the d... 详细信息
来源: 评论
Design and Implementation of a zero-knowledge Authentication Framework for Java Card
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 2011年 第3期5卷 1-18页
作者: Patel, Ahmed Kalajdzic, Kenan Golafshan, Laleh Taghavi, Mona Univ Kebangsaan Malaysia Comp Sci Bangi Malaysia Kingston Univ Kingston Upon Thames Surrey England Ctr Comp Educ Tuzla Bosnia & Herceg Islamic Azad Univ Dept Comp Engn & IT Sci & Res Branch Fars Iran Islamic Azad Univ Dept Comp Sci & Res Branch Tehran Iran
zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart ... 详细信息
来源: 评论