咨询与建议

限定检索结果

文献类型

  • 22 篇 会议
  • 17 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 29 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 8 篇 信息与通信工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 测绘科学与技术
    • 1 篇 网络空间安全
  • 11 篇 理学
    • 11 篇 数学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 法学
    • 1 篇 政治学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 41 篇 commitment schem...
  • 3 篇 homomorphic encr...
  • 3 篇 zero-knowledge p...
  • 3 篇 security
  • 3 篇 privacy
  • 3 篇 ring signature
  • 2 篇 standard model
  • 2 篇 identity-committ...
  • 2 篇 verifiable secre...
  • 2 篇 unlinkable posts
  • 2 篇 lattice-based pr...
  • 2 篇 tightness
  • 2 篇 unconditional se...
  • 2 篇 cryptographic sc...
  • 2 篇 zero-knowledge
  • 2 篇 zero knowledge p...
  • 2 篇 non-malleable
  • 2 篇 blockchain
  • 2 篇 social media
  • 2 篇 cryptography

机构

  • 2 篇 univ pompeu fabr...
  • 2 篇 univ tartu tartu...
  • 2 篇 univ chinese aca...
  • 2 篇 osaka univ grad ...
  • 1 篇 natl chengchi un...
  • 1 篇 ist austria klos...
  • 1 篇 saarland univ sa...
  • 1 篇 sbpcoe dept comp...
  • 1 篇 aarhus univ dept...
  • 1 篇 chinese acad sci...
  • 1 篇 beijing normal u...
  • 1 篇 chinese acad sci...
  • 1 篇 shriram iet dept...
  • 1 篇 ntnu norwegian u...
  • 1 篇 univ yaounde i d...
  • 1 篇 ecole polytech f...
  • 1 篇 inst informat se...
  • 1 篇 indian inst tech...
  • 1 篇 lebanese univ sc...
  • 1 篇 cispa helmholtz ...

作者

  • 4 篇 miyaji hideaki
  • 4 篇 miyaji atsuko
  • 2 篇 wang mengfan
  • 2 篇 hu lei
  • 2 篇 hsu po-chu
  • 2 篇 wang yuntao
  • 2 篇 pan jiaxin
  • 2 篇 huang guifang
  • 2 篇 wagner benedikt
  • 1 篇 mohan maya
  • 1 篇 taparia ankit
  • 1 篇 blundo c
  • 1 篇 viterbo emanuele
  • 1 篇 gaborit philippe
  • 1 篇 chalkias konstan...
  • 1 篇 weihua hou
  • 1 篇 zhou fucai
  • 1 篇 lind joshua
  • 1 篇 sharma ajay
  • 1 篇 kruglik stanisla...

语言

  • 40 篇 英文
  • 1 篇 中文
检索条件"主题词=commitment scheme"
41 条 记 录,以下是1-10 订阅
排序:
Lattice-Based commitment scheme for Low Communication Costs
收藏 引用
IEEE ACCESS 2024年 12卷 111400-111410页
作者: Miyaji, Hideaki Wang, Yuntao Miyaji, Atsuko Ritsumeikan Univ Coll Informat Sci & Technol Ibaraki Osaka 5678570 Japan Univ Electrocommun Grad Sch Informat & Engn Chofu Tokyo 1828585 Japan Osaka Univ Grad Sch Engn Suita Osaka 5650871 Japan
commitment schemes are cryptographic schemes that can be applied to zero-knowledge proof construction and blockchain construction. Recently, lattice-based cryptography has been intensively investigated due to the prom... 详细信息
来源: 评论
Message-Restriction-Free commitment scheme Based on Lattice Assumption  1
收藏 引用
16th International Conference on Information Security Practice and Experience (ISPEC)
作者: Miyaji, Hideaki Wang, Yuntao Miyaji, Atsuko Osaka Univ Grad Sch Engn Suita Osaka Japan Japan Adv Inst Sci & Technol Sch Informat Sci Nomi Japan
A commitment scheme is a fundamental protocol and an essential component of basic cryptographic tasks, such as zero-knowledge identification. In recent years, lattice-based cryptography has been intensively studied ow... 详细信息
来源: 评论
Fuzzy commitment scheme based on Reed Solomon Codes  16
Fuzzy Commitment Scheme based on Reed Solomon Codes
收藏 引用
9th International Conference on Security of Information and Networks (SIN)
作者: Chauhan, Sonam Sharma, Ajay SRM Univ Delhi NCR Sonepat Haryana India
commitment scheme is the basic element of various cryptographic protocols. The fuzziness introduced in the fuzzy commitment scheme allows small amount of corruptions. The fuzzy commitment scheme based on the cryptogra... 详细信息
来源: 评论
Decreasing Proof Size of BLS scheme
收藏 引用
COMPUTER JOURNAL 2023年 第3期67卷 1030-1040页
作者: Fang, Dong Huang, Guifang Wang, Mengfan Hu, Lei Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100093 Peoples R China
Bootle et al. in CRYPTO 2019 proposed a zero knowledge proof for an ISISm,n,q,beta instance A (s) over right arrow= (u) over right arrow mod q with parallel to(s) over right arrow parallel to(infinity) <= beta (BLS... 详细信息
来源: 评论
Privacy-Preserving Social Media With Unlinkability and Disclosure
收藏 引用
IEEE ACCESS 2023年 11卷 28955-28965页
作者: Miyaji, Hideaki Hsu, Po-Chu Miyaji, Atsuko Osaka Univ Grad Sch Engn Suita Osaka 0650871 Japan JAIST Nomi Ishikawa 9231292 Japan
Social media (SM) has become a primary communication tool in the modern world, with an ever-increasing volume of users. Many SM users use anonymous nicknames as their public usernames. However, Zhang et al. (2018) wer... 详细信息
来源: 评论
Somewhere Statistically Binding commitment schemes with Applications  25th
Somewhere Statistically Binding Commitment Schemes with Appl...
收藏 引用
25th International Conference on Financial Cryptography and Data Security (FC)
作者: Fauzi, Prastudy Lipmaa, Helger Pindado, Zaira Siim, Janno Simula UiB Bergen Norway Univ Tartu Tartu Estonia Univ Pompeu Fabra Barcelona Spain
We define a new primitive that we call a somewhere statistically binding (SSB) commitment scheme, which is a generalization of dual-mode commitments but has similarities with SSB hash functions (Hubacek and Wichs, ITC... 详细信息
来源: 评论
commitments via Physically Related Functions
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2023年 18卷 1497-1508页
作者: Boyapally, Harishma Patranabis, Sikhar Mukhopadhyay, Debdeep Indian Inst Technol Kharagpur Kharagpur 721302 India Swiss Fed Inst Technol CH-8092 Zurich Switzerland IBM Res Bengaluru 560045 India
commitment schemes are one of the basic building blocks to construct secure protocols for multi party computation. Many recent works are exploring hardware primitives like physically unclonable functions to build keyl... 详细信息
来源: 评论
A verifiable scheme for differential privacy based on zero-knowledge proofs
收藏 引用
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES 2025年 第3期37卷 1-15页
作者: Wei, Jianqi Chen, Yuling Yang, Xiuzhang Luo, Yun Pei, Xintao Guizhou Univ State Key Lab Publ Big Data Guiyang 550025 Peoples R China Guizhou Univ Coll Comp Sci & Technol Guiyang 550025 Peoples R China
The protection of personal privacy has become a paramount issue in the field of data science, with its significance continuously rising. Differential privacy technology has garnered significant attention for its effec... 详细信息
来源: 评论
Avoiding trusted setup in isogeny-based commitments
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2025年 1-19页
作者: Saah, Gustave Tchoffo Fouotsa, Tako Boris Fouotsa, Emmanuel Nkuimi-Jugnia, Celestin Univ Yaounde I Dept Math Yaounde Cameroon Univ Bamenda Ctr Cybersecur & Math Cryptol Bamenda Cameroon Ecole Polytech Fed Lausanne Lausanne Switzerland
In 2021, Sterner proposed a commitment scheme based on supersingular isogenies. For this scheme to be binding, one relies on a trusted party to generate a starting supersingular elliptic curve of unknown endomorphism ... 详细信息
来源: 评论
Toothpicks: More Efficient Fork-Free Two-Round Multi-signatures  43rd
Toothpicks: More Efficient Fork-Free Two-Round Multi-signatu...
收藏 引用
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)
作者: Pan, Jiaxin Wagner, Benedikt Univ Kassel Kassel Germany Saarland Univ CISPA Helmholtz Ctr Informat Secur Saarbrucken Germany
Tightly secure cryptographic schemes can be implemented with standardized parameters, while still having a sufficiently high security level backed up by their analysis. In a recent work, Pan and Wagner (Eurocrypt 2023... 详细信息
来源: 评论