咨询与建议

限定检索结果

文献类型

  • 22 篇 会议
  • 16 篇 期刊文献
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 40 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 28 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 9 篇 信息与通信工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 测绘科学与技术
    • 1 篇 网络空间安全
  • 10 篇 理学
    • 10 篇 数学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 法学
    • 1 篇 政治学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 40 篇 commitment schem...
  • 3 篇 homomorphic encr...
  • 3 篇 zero-knowledge p...
  • 3 篇 security
  • 3 篇 privacy
  • 3 篇 ring signature
  • 2 篇 standard model
  • 2 篇 identity-committ...
  • 2 篇 verifiable secre...
  • 2 篇 unlinkable posts
  • 2 篇 lattice-based pr...
  • 2 篇 tightness
  • 2 篇 unconditional se...
  • 2 篇 cryptographic sc...
  • 2 篇 zero-knowledge
  • 2 篇 zero knowledge p...
  • 2 篇 non-malleable
  • 2 篇 blockchain
  • 2 篇 social media
  • 2 篇 cryptography

机构

  • 2 篇 univ pompeu fabr...
  • 2 篇 univ tartu tartu...
  • 2 篇 univ chinese aca...
  • 2 篇 osaka univ grad ...
  • 1 篇 natl chengchi un...
  • 1 篇 ist austria klos...
  • 1 篇 saarland univ sa...
  • 1 篇 sbpcoe dept comp...
  • 1 篇 aarhus univ dept...
  • 1 篇 chinese acad sci...
  • 1 篇 beijing normal u...
  • 1 篇 chinese acad sci...
  • 1 篇 shriram iet dept...
  • 1 篇 state key labora...
  • 1 篇 ntnu norwegian u...
  • 1 篇 inst informat se...
  • 1 篇 indian inst tech...
  • 1 篇 lebanese univ sc...
  • 1 篇 cispa helmholtz ...
  • 1 篇 osaka univ grad ...

作者

  • 4 篇 miyaji hideaki
  • 4 篇 miyaji atsuko
  • 2 篇 zhou fucai
  • 2 篇 wang mengfan
  • 2 篇 hu lei
  • 2 篇 hsu po-chu
  • 2 篇 wang yuntao
  • 2 篇 pan jiaxin
  • 2 篇 huang guifang
  • 2 篇 wagner benedikt
  • 1 篇 mohan maya
  • 1 篇 taparia ankit
  • 1 篇 blundo c
  • 1 篇 viterbo emanuele
  • 1 篇 gaborit philippe
  • 1 篇 chalkias konstan...
  • 1 篇 weihua hou
  • 1 篇 lind joshua
  • 1 篇 sharma ajay
  • 1 篇 kruglik stanisla...

语言

  • 39 篇 英文
  • 1 篇 中文
检索条件"主题词=commitment scheme"
40 条 记 录,以下是1-10 订阅
排序:
A straight-line extractable non-malleable commitment scheme
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2007年 第7期E90A卷 1384-1394页
作者: Arita, Seiko Inst Informat Secur Yokohama Kanagawa 2210835 Japan
Non-malleability is an important security property of commitment schemes. The property means security against the man-in-the-middle attack, and it is defined and proved in the simulation paradigm using the correspondi... 详细信息
来源: 评论
Lattice-Based commitment scheme for Low Communication Costs
收藏 引用
IEEE ACCESS 2024年 12卷 111400-111410页
作者: Miyaji, Hideaki Wang, Yuntao Miyaji, Atsuko Ritsumeikan Univ Coll Informat Sci & Technol Ibaraki Osaka 5678570 Japan Univ Electrocommun Grad Sch Informat & Engn Chofu Tokyo 1828585 Japan Osaka Univ Grad Sch Engn Suita Osaka 5650871 Japan
commitment schemes are cryptographic schemes that can be applied to zero-knowledge proof construction and blockchain construction. Recently, lattice-based cryptography has been intensively investigated due to the prom... 详细信息
来源: 评论
Non-interactive and Non-malleable commitment scheme Based on q-one Way Group Homomorphisms
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2008年 第5期13卷 574-578页
作者: 张宗洋 董晓蕾 曹珍富 Computer Science & Engineering Department Shanghai Jiaotong University
commitment scheme is a basic component of many cryptographic protocols, such as coin-tossing, identification schemes, zero-knowledge and multi-party computation. In order to prevent man-in-middle attacks, non-malleabi... 详细信息
来源: 评论
Fuzzy commitment scheme based on Reed Solomon Codes  16
Fuzzy Commitment Scheme based on Reed Solomon Codes
收藏 引用
9th International Conference on Security of Information and Networks (SIN)
作者: Chauhan, Sonam Sharma, Ajay SRM Univ Delhi NCR Sonepat Haryana India
commitment scheme is the basic element of various cryptographic protocols. The fuzziness introduced in the fuzzy commitment scheme allows small amount of corruptions. The fuzzy commitment scheme based on the cryptogra... 详细信息
来源: 评论
Message-Restriction-Free commitment scheme Based on Lattice Assumption  1
收藏 引用
16th International Conference on Information Security Practice and Experience (ISPEC)
作者: Miyaji, Hideaki Wang, Yuntao Miyaji, Atsuko Osaka Univ Grad Sch Engn Suita Osaka Japan Japan Adv Inst Sci & Technol Sch Informat Sci Nomi Japan
A commitment scheme is a fundamental protocol and an essential component of basic cryptographic tasks, such as zero-knowledge identification. In recent years, lattice-based cryptography has been intensively studied ow... 详细信息
来源: 评论
A verifiable scheme for differential privacy based on zero-knowledge proofs
收藏 引用
Journal of King Saud University - Computer and Information Sciences 2025年 第3期37卷 1-15页
作者: Wei, Jianqi Chen, Yuling Yang, Xiuzhang Luo, Yun Pei, Xintao State Key Laboratory of Public Big Data Guizhou University Guiyang 550025 China College of Computer Science and Technology Guizhou University Guiyang 550025 China
The protection of personal privacy has become a paramount issue in the field of data science, with its significance continuously rising. Differential privacy technology has garnered significant attention for its effec... 详细信息
来源: 评论
Constructions and bounds for unconditionally secure non-interactive commitment schemes
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2002年 第1-3期26卷 97-110页
作者: Blundo, C Masucci, B Stinson, DR Wei, R Univ Salerno Dipartimento Informat & Applicaz I-84081 Baronissi SA Italy Univ Waterloo Dept Combinator & Optimizat Waterloo ON N2L 3G1 Canada Lakehead Univ Dept Comp Sci Thunder Bay ON P7B 5E1 Canada
commitment schemes have been extensively studied since they were introduced by Blum in 1982. Rivest recently showed how to construct unconditionally secure non-interactive commitment schemes, assuming the existence of... 详细信息
来源: 评论
The Multireceiver commitment schemes
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第6期13卷 759-764页
作者: WANG Shuhong QI Zhifeng Security Research Center Sumavision Technologies CO. LTD. Beijing 100085 China
Existing commitment schemes were addressed under the classic two-party scenario, However, popularity of the secure multi-party computation in today's lush network communication is motivating us to adopt more sophisti... 详细信息
来源: 评论
New efficient non-malleable commitment schemes
New efficient non-malleable commitment schemes
收藏 引用
6th International Conference on Advanced Language Processing and Web Information Technology
作者: Dou Jiawei Li Shundong Beijing Architectural & Civil Engn Inst Dept Basic Sci Beijing 100044 Peoples R China Beijing Normal Univ Dept Comp Sci & Technol Beijing 100875 Peoples R China
Non-malleable commitment is recently one of research focuses in international cryptographic community. It has many important applications in e-commerce, and plays important role in constructing other cryptographic pro... 详细信息
来源: 评论
Somewhere Statistically Binding commitment schemes with Applications  25th
Somewhere Statistically Binding Commitment Schemes with Appl...
收藏 引用
25th International Conference on Financial Cryptography and Data Security (FC)
作者: Fauzi, Prastudy Lipmaa, Helger Pindado, Zaira Siim, Janno Simula UiB Bergen Norway Univ Tartu Tartu Estonia Univ Pompeu Fabra Barcelona Spain
We define a new primitive that we call a somewhere statistically binding (SSB) commitment scheme, which is a generalization of dual-mode commitments but has similarities with SSB hash functions (Hubacek and Wichs, ITC... 详细信息
来源: 评论