搜索结果: 1-15 共查到“军事学 Decentralized”相关记录41条 . 查询时间(0.062 秒)
Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs
anonymous authentication attribute collusion attack
2019/6/14
We propose a decentralized multi-authority anonymous authentication scheme in which a prover and a verifier are non-interactive. We give two security definitions; resistance against collusion attacks ...
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
attribute based signature anonymous credentials threshold cryptography
2019/3/1
In this work, we revisit multi-authority attribute based signatures (MA-ABS), and elaborate on the limitations of the current MA-ABS schemes to provide a hard to achieve (yet very useful) combination ...
FE for Inner Products and Its Application to Decentralized ABE
functional encryption ABE LWE DDH
2019/1/18
In this work, we revisit the primitive functional encryption (FE) for inner products and show its application to decentralized attribute- based encryption (ABE). Particularly, we derive an FE for inne...
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks
blockchain decentralized anonymity
2019/1/9
Distributed credit networks, such as Ripple and Stellar, are becoming popular as an alternative means for financial transactions. However, the current designs do not preserve user privacy or are not t...
DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm
Blockchain Blocklattice Consensus
2018/11/20
A blockchain system is a replicated state machine that must be fault tolerant. When designing a blockchain system, there is usually a trade-off between decentralization, scalability, and security. In ...
Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure
public key infrastracture accumulators
2018/11/15
Public-key infrastructures (PKIs) are an integral part of the security foundations of digital communications. Their widespread deployment has allowed the growth of important applications, such as, int...
Zexe: Enabling Decentralized Private Computation
decentralized computation zero knowledge proofs succinct arguments
2018/11/6
Ledger-based systems that enable rich applications often suffer from two limitations. First, validating a transaction requires re-executing the state transition that it attests to. Second, transaction...
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
Decentralization FHE 2-DNF
2018/11/2
Machine learning and group testing are quite useful methods for many different fields such as finance, banks, biology, medicine, etc. These application domains use quite sensitive data, and huge amoun...
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
public-key cryptography attribute-based encryption
2018/8/21
Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and po...
We present the first provably secure, practical approach to proving file replication (or other erasure coding) in distributed storage networks (DSNs). Storing multiple copies of a file FF is essential...
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability
digital currencies anonymity zero knowledge
2018/3/6
Digital currencies like Bitcoin and other blockchain based systems provide means to record monetary transfers between accounts. In Bitcoin like systems transactions are published on a decentralized le...
Sentiment Protocol: A Decentralized Protocol Leveraging Crowd Sourced Wisdom
sentiment blockchain ethereum
2017/11/28
The wisdom of the crowd is a valuable asset in today's society. It is not only important in predicting elections but also plays an essential rôle in marketing and the financial industry. Having a...
Decentralized Multi-Client Functional Encryption for Inner Product
Functional Encryption Inner Product Private Stream Aggregation
2017/10/12
Multi-input functional encryption is a very useful generalization of Functional Encryption, which has been motivated by Goldwasser et al. from Eurocrypt ’14. All the constructions, however, rely on no...
We present efficient protocols for amortized secure multiparty computation with penalties and secure cash distribution, of which poker is a prime example. Our protocols have an initial phase where the...
CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing
Crowdsourcing blockchain state machine
2017/5/25
Crowdsourcing systems have gained considerable interest and adoption in recent years. They coordinate the human intelligence of individual and businesses together from all over the world to solve comp...