Zero-knowledge succinct non-interactive arguments of knowledge(zk-SNARKs)are cryptographic protocols that ofer efcient and privacy-preserving means of verifying NP language relations and have drawn considerable atten‑...
详细信息
Zero-knowledge succinct non-interactive arguments of knowledge(zk-SNARKs)are cryptographic protocols that ofer efcient and privacy-preserving means of verifying NP language relations and have drawn considerable atten‑tion for their appealing applications,e.g.,verifable computation and anonymous payment *** with the pre-quantum case,the practicability of this primitive in the post-quantum setting is still unsatisfactory,espe‑cially for the space *** tackle this issue,this work seeks to enhance the efciency and compactness of lat‑tice-based zk-SNARKs,including proof length and common reference string(CRS)*** this paper,we develop the framework of square span program-based SNARKs and design new zk-SNARKs over cyclotomic *** with previous works,our construction is without parallel repetition and achieves shorter proof and CRS lengths than previous lattice-based zk-SNARK ***,the proof length of our scheme is around 23.3%smaller than the recent shortest lattice-based zk-SNARKs by Ishai et al.(in:Proceedings of the 2021 ACM SIGSAC conference on computer and communications security,pp 212-234,2021),and the CRS length is 3.6×*** constructions follow the framework of Gennaro et al.(in:Proceedings of the 2018 ACM SIGSAC conference on computer and com‑munications security,pp 556-573,2018),and adapt it to the ring setting by slightly modifying the knowledge *** develop concretely small constructions by using module-switching and key-switching procedures in a novel way.
The widespread application of AI-generated content (AIGC) services has driven demand for efficient computational resources, making effective task scheduling and computation offloading in edge computing (EC) environmen...
详细信息
The rapid evolution of the Internet-of-Vehicles (IoV) has amplified the need for mobile computing resources, driving the shift toward offloading tasks to edge servers or vehicles with idle resources to optimize comput...
详细信息
In high-density crowd, a unique visual motion effect called stop-and-go wave occurs, which could evolve to trampling and compression incidents. However, few computational models have been reported for stop-and-go wave...
详细信息
Oneway real functions are effective maps on positive-measure sets of reals that preserve randomness and have no effective probabilistic inversions. We construct a oneway real function which is collision-resistant: the...
详细信息
Microkernel integrity is an important aspect of security for the whole microkernel system. Many of the research works on microkernel integrity focus on analysis and safeguards against the existing kernel attacks, and ...
详细信息
Microkernel integrity is an important aspect of security for the whole microkernel system. Many of the research works on microkernel integrity focus on analysis and safeguards against the existing kernel attacks, and security enhancements for the vulnerabilities of system design and implementation aspects. The formal methods for operating system design and verification ensure the system's high level of security. The existing formalization work and research for operating system mainly focus on the code-level verification of program correctness. In this paper, we propose a formal abstraction model of microkernel in order to accurately describe the semantics of every kernel behavior, and achieve the description of the whole kernel. Based on the model we illustrate the microkernel integrity criterions and elaborate on the integrity mechanism. Meanwhile, we formally verify the completeness and consistency between the mechanism and the definition of the microkernel integrity. We use the self-implemented operating system VTOS (Verified trusted operating system) as an example to illustrate the design method for the microkernel integrity.
作者:
Meng, BoningWang, JuqiuXia, Mingji
State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing100080 China
The complexity classification of the Holant problem has remained unresolved for the past fifteen years. Counting complex-weighted Eulerian orientation problems, denoted as #EO, is regarded as one of the most significa...
详细信息
Human motion prediction is of great importance for artificial intelligence systems, particularly in fields like autonomous driving and human-computer interaction. Existing methods have achieved good results in simple ...
详细信息
As large language models (LLMs) increasingly become central to various applications and interact with diverse user populations, ensuring their reliable and consistent performance is becoming more important. This paper...
详细信息
With the rapid progress in quantum hardware and software, the need for verification of quantum systems becomes increasingly crucial. While model checking is a dominant and very successful technique for verifying class...
详细信息
暂无评论