Deep Reinforcement Learning (DRL) has emerged as a pivotal technology in modern transportation systems, offering considerable potential to enhance driving safety and optimize performance. This study underscores the si...
详细信息
In this paper,we propose the concept of delegable zero knowledge succinct non-interactive arguments of knowledge(zk-SNARKs).The delegable zk-SNARKKis parameterized by(u,k,k',k").The delegable property of zk-S...
详细信息
In this paper,we propose the concept of delegable zero knowledge succinct non-interactive arguments of knowledge(zk-SNARKs).The delegable zk-SNARKKis parameterized by(u,k,k',k").The delegable property of zk-SNARKs allows the prover to delegate its proving ability toμ*** k honest proxies are able to generate the correct proof for a statement,but the collusion of less than k proxies does not obtain information about the witness of the *** also define k'-soundness and k"-zero knowledge by taking into consider of *** propose a construction of(μ,2t+1,t,t)-delegable zk-SNARK for the NPC language of arithmetic circuit *** delegable zk-SNARK stems from Groth's zk-SNARK scheme(Groth16).We take advantage of the additive and multiplicative properties of polynomial-based secret sharing schemes to achieve delegation for *** secret sharing scheme works well with the pairing groups so that the nice succinct properties of Groth's zk-SNARK scheme are preserved,while augmenting the delegable property and keeping soundness and zero-knowledge in the scenario of multi-proxies.
COVID-19 is a very dangerous pandemic attacking the respiratory organs of humans. It is characterized by its contagious speed, especially with its last versions. Effectiveness of confrontation resides in a strategy ba...
详细信息
Credit card fraud detection plays a crucial role in safeguarding the financial security of individuals and organizations. However, imbalanced datasets pose significant challenges to accurately identifying fraudulent t...
详细信息
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers ...
详细信息
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge *** storage capacity of edge nodes close to users is *** should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging *** paper proposes a redundant data detection method that meets the privacy protection *** scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot *** has the same effect as zero-knowledge proof,and it will not reveal the privacy of *** addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the *** use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is *** feasibility of the scheme is proved through safety analysis and efficiency analysis.
PointCLIP shows that transferring 2D knowledge to zero-shot 3D shape classification tasks can be effective, even without incorporating 3D-specific knowledge. However, the absence of 3D knowledge limits the model’s pe...
详细信息
Content-based image retrieval (CBIR) is a method of developing image search engines. It involves searching for images that are similar to a given query image from a large collection of images. This is done b...
详细信息
In an era marked by the ubiquity of digital identity verification, the realm of biometrics, especially facial recognition, has been a focal point of research. While it has exhibited impressive performance under contro...
详细信息
Deep neural networks can be vulnerable to adversarial attacks, even for the mainstream Transformer-based models. Although several robustness enhancement approaches have been proposed, they usually focus on some certai...
详细信息
Multi-view action recognition aims to identify action categories from given clues. Existing studies ignore the negative influences of fuzzy views between view and action in disentangling, commonly arising the mistaken...
详细信息
暂无评论