Zobrazeno 1 - 10
of 5 915
pro vyhledávání: '"zero knowledge"'
Autor:
Williams, Alex1 (AUTHOR)
Publikováno v:
Communications of the ACM. Jul2024, Vol. 67 Issue 7, p6-7. 2p.
Autor:
Maher Maalla, Sergey V. Bezzateev
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 24, Iss 5, Pp 797-805 (2024)
Attribute Based Access Control (ABAC) is one the most efficient, scalable, and well used access control. It’s based on attributes not on users, but even when the users want to get access to some resource, they must submit their attributes for the
Externí odkaz:
https://doaj.org/article/ba36671e43e34f86b877ccd1a5c8b2b6
Autor:
Groth, Jens1 j.groth@ucl.ac.uk, Ostrovsky, Rafail2 rafail@cs.ucla.edu, Sahai, Amit3 sahai@cs.ucla.edu
Publikováno v:
Journal of the ACM. Jun2012, Vol. 59 Issue 3, p11-11:35. 35p.
Autor:
Šeila Bećirović Ramić, Ehlimana Cogo, Irfan Prazina, Emir Cogo, Muhamed Turkanović, Razija Turčinhodžić Mulahasanović, Saša Mrdović
Publikováno v:
ICT Express, Vol 10, Iss 4, Pp 916-934 (2024)
Digital credentials represent digital versions of physical credentials. They are the cornerstone of digital identity on the Internet. In order to enhance privacy, different authors implement selective disclosure in digital credentials, allowing users
Externí odkaz:
https://doaj.org/article/b1885e33be644e57948ad7391429a515
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-22 (2024)
Abstract Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two different blockchains. However, most known ACCS schemes assume specific scripting functionalities o
Externí odkaz:
https://doaj.org/article/c4289469a0414936b3128e1f7800bd59
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 9, Pp 102207- (2024)
Zero-knowledge proofs introduce a mechanism to prove that certain computations were performed without revealing any underlying information and are used commonly in blockchain-based decentralized apps (dapps). This cryptographic technique addresses tr
Externí odkaz:
https://doaj.org/article/d2cc40119b8f4a06a0a7f94fe8e42b19
Publikováno v:
PeerJ Computer Science, Vol 10, p e2268 (2024)
The increased use of artificial intelligence generated content (AIGC) among vast user populations has heightened the risk of private data leaks. Effective auditing and regulation remain challenging, further compounding the risks associated with the l
Externí odkaz:
https://doaj.org/article/bd8e01283f844a868574f4c531afa207
Autor:
Lorenzo Grassi, Dmitry Khovratovich, Reinhard Lüftenegger, Christian Rechberger, Markus Schofnegger, Roman Walch
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 3 (2024)
Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications. Among those, recursive SNARKs and folding schemes require hash functions to be both fast in native CPU computations and compact in algebr
Externí odkaz:
https://doaj.org/article/8a0edbe6b0d944389a545785d4da71f3
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 4 (2024)
Zero-knowledge proof (ZKP) is a cryptographic primitive that enables a prover to convince a verifier that a statement is true, without revealing any other information beyond the correctness of the statement itself. Due to its powerful capabilities, i
Externí odkaz:
https://doaj.org/article/531b819b7f574f3083f36b9dd3bf17f7