Zobrazeno 1 - 10
of 128
pro vyhledávání: '"Emura Keita"'
Account abstraction allows a contract wallet to initiate transaction execution. Thus, account abstraction is useful for preserving the privacy of externally owned accounts (EOAs) because it can remove a transaction issued from an EOA to the contract
Externí odkaz:
http://arxiv.org/abs/2309.03480
Publikováno v:
Journal of Mathematical Cryptology, Vol 9, Iss 2, Pp 63-74 (2015)
In this paper, we introduce the notion of secret key encryption with non-interactive opening (SKENO). With SKENO, one can make a non-interactive proof π to show that the decryption result of a ciphertext C under a shared secret key K is indeed plain
Externí odkaz:
https://doaj.org/article/1dcdc715c1ec4a299df55a43ff0d5fff
Autor:
Emura, Keita, Yoshimi, Masato
Due to the increasing use of encrypted communication, such as Transport Layer Security (TLS), encrypted cache systems are a promising approach for providing communication efficiency and privacy. Cache-22 is an encrypted cache system (Emura et al. ISI
Externí odkaz:
http://arxiv.org/abs/2302.11292
In an open-bid auction, a bidder can know the budgets of other bidders. Thus, a sealed-bid auction that hides bidding prices is desirable. However, in previous sealed-bid auction protocols, it has been difficult to provide a ``fund binding'' property
Externí odkaz:
http://arxiv.org/abs/2207.10823
During the Coincheck incident, which recorded the largest damages in cryptocurrency history in 2018, it was demonstrated that using Mosaic token can have a certain effect. Although it seems attractive to employ tokens as countermeasures for cryptocur
Externí odkaz:
http://arxiv.org/abs/2010.00206
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In Theoretical Computer Science 8 January 2022 900:97-119
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In Theoretical Computer Science 8 April 2021 863:127-155
Publikováno v:
In Journal of Computer and System Sciences December 2020 114:107-125