Found: 59
Select item for more details and to access through your institution.
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 45, n. 2, p. 1805, doi. 10.32604/csse.2023.029622
- By:
- Publication type:
- Article
APPLICATION OF ZERO-KNOWLEDGE PROOF IN RESOLVING DISPUTES OF PRIVILEGED DOCUMENTS IN E-DISCOVERY.
- Published in:
- Harvard Journal of Law & Technology, 2019, v. 32, n. 2, p. 633
- By:
- Publication type:
- Article
On the obfuscatability of quantum point functions.
- Published in:
- Quantum Information Processing, 2019, v. 18, n. 2, p. 1, doi. 10.1007/s11128-019-2172-2
- By:
- Publication type:
- Article
Concurrent non-malleable zero-knowledge and simultaneous resettable non-malleable zero-knowledge in constant rounds.
- Published in:
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0014-7
- By:
- Publication type:
- Article
Confidential and efficient asset proof for bitcoin exchanges.
- Published in:
- Sādhanā: Academy Proceedings in Engineering Sciences, 2018, v. 43, n. 8, p. 1, doi. 10.1007/s12046-018-0880-4
- By:
- Publication type:
- Article
An efficient privacy-preserving P2P protocol for computing maximum value in the presence of active adversaries.
- Published in:
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 1, p. 34, doi. 10.1007/s12083-016-0490-z
- By:
- Publication type:
- Article
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 961, doi. 10.1007/s00145-016-9239-3
- By:
- Publication type:
- Article
The Hunting of the SNARK.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 989, doi. 10.1007/s00145-016-9241-9
- By:
- Publication type:
- Article
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 1116, doi. 10.1007/s00145-016-9243-7
- By:
- Publication type:
- Article
Traffic-aware overload control scheme in 5G ultra-dense M2M networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2017, v. 28, n. 9, p. n/a, doi. 10.1002/ett.3146
- By:
- Publication type:
- Article
Delay- and energy-aware load balancing in ultra-dense heterogeneous 5G networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2017, v. 28, n. 9, p. n/a, doi. 10.1002/ett.3170
- By:
- Publication type:
- Article
Reconciling Non-malleability with Homomorphic Encryption.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 3, p. 601, doi. 10.1007/s00145-016-9231-y
- By:
- Publication type:
- Article
An efficient authentication protocol using zero knowledge property and pairing on elliptic curves.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 2155
- By:
- Publication type:
- Article
Zero-Knowledge-Private Counting of Group Triangles in Social Networks.
- Published in:
- Computer Journal, 2017, v. 60, n. 1, p. 126, doi. 10.1093/comjnl/bxw074
- By:
- Publication type:
- Article
Quantum Bit Commitment - Within an Equivalence Class.
- Published in:
- International Journal of Unconventional Computing, 2016, v. 12, n. 5/6, p. 413
- By:
- Publication type:
- Article
A hybrid approach to vector-based homomorphic tallying remote voting.
- Published in:
- International Journal of Information Security, 2016, v. 15, n. 2, p. 211, doi. 10.1007/s10207-015-0279-8
- By:
- Publication type:
- Article
Strongly simulation-extractable leakage-resilient NIZK.
- Published in:
- International Journal of Information Security, 2016, v. 15, n. 1, p. 67, doi. 10.1007/s10207-015-0291-z
- By:
- Publication type:
- Article
A Zero Knowledge Proof Implementation Using NXP Security Engine.
- Published in:
- Journal of Network & Information Security, 2016, v. 4, n. 1, p. 38
- By:
- Publication type:
- Article
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 4, p. 820, doi. 10.1007/s00145-014-9184-y
- By:
- Publication type:
- Article
Obligations In Medical Crises: Treatment and Protocols.
- Published in:
- Metaphilosophy, 2015, v. 46, n. 4/5, p. 595, doi. 10.1111/meta.12156
- By:
- Publication type:
- Article
How to Achieve Perfect Simulation and a Complete Problem for Non-interactive Perfect Zero-Knowledge.
- Published in:
- Journal of Cryptology, 2015, v. 28, n. 3, p. 533, doi. 10.1007/s00145-013-9165-6
- By:
- Publication type:
- Article
Application of Quaternion Numbers in Identification Scheme.
- Published in:
- Journal of Network & Information Security, 2015, v. 3, n. 2, p. 17, doi. 10.21863/jnis/2015.3.2.008
- By:
- Publication type:
- Article
TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 1077, doi. 10.1007/s11277-013-1555-4
- By:
- Publication type:
- Article
A zero-knowledge protocol for nuclear warhead verification.
- Published in:
- Nature, 2014, v. 510, n. 7506, p. 497, doi. 10.1038/nature13457
- By:
- Publication type:
- Article
On the Amortized Complexity of Zero-Knowledge Protocols.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 2, p. 284, doi. 10.1007/s00145-013-9145-x
- By:
- Publication type:
- Article
Zero Knowledge and Hash-Based Secure Access Control Scheme for Mobile RFID Systems.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2014, v. 39, n. 3, p. 1897, doi. 10.1007/s13369-013-0885-6
- By:
- Publication type:
- Article
PROOF PROBLEMS WITH DIAGRAMS: AN OPPORTUNITY FOR EXPERIENCING PROOFS AND REFUTATIONS.
- Published in:
- For the Learning of Mathematics, 2014, v. 34, n. 1, p. 36
- By:
- Publication type:
- Article
LINKAGES AND LINEAGES.
- Published in:
- For the Learning of Mathematics, 2014, v. 34, n. 1, p. 50
- By:
- Publication type:
- Article
Concurrent Zero Knowledge, Revisited.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 1, p. 45, doi. 10.1007/s00145-012-9137-2
- By:
- Publication type:
- Article
A New Interactive Hashing Theorem.
- Published in:
- Journal of Cryptology, 2014, v. 27, n. 1, p. 109, doi. 10.1007/s00145-012-9139-0
- By:
- Publication type:
- Article
UC and EUC Weak Bit-Commitments Using Seal-Once Tamper-Evidence.
- Published in:
- Scientific Annals of Computer Science, 2013, v. 23, n. 2, p. 191, doi. 10.7561/SACS.2013.2.191
- By:
- Publication type:
- Article
A Note on Constant-Round Zero-Knowledge Proofs of Knowledge.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 4, p. 638, doi. 10.1007/s00145-012-9132-7
- By:
- Publication type:
- Article
FlipIt: The Game of 'Stealthy Takeover'.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 4, p. 655, doi. 10.1007/s00145-012-9134-5
- By:
- Publication type:
- Article
Round-Optimal Password-Based Authenticated Key Exchange.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 4, p. 714, doi. 10.1007/s00145-012-9133-6
- By:
- Publication type:
- Article
Mercurial Commitments with Applications to Zero-Knowledge Sets.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 2, p. 251, doi. 10.1007/s00145-012-9122-9
- By:
- Publication type:
- Article
On technology neutral policies for e-identity: A critical reflection based on UK identity policy.
- Published in:
- Journal of International Commercial Law & Technology, 2013, v. 8, n. 2, p. 134
- By:
- Publication type:
- Article
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 2, p. 161, doi. 10.1002/sec.543
- By:
- Publication type:
- Article
Public-Coin Parallel Zero-Knowledge for NP.
- Published in:
- Journal of Cryptology, 2013, v. 26, n. 1, p. 1, doi. 10.1007/s00145-011-9110-5
- By:
- Publication type:
- Article
Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 7, p. 764, doi. 10.1002/sec.371
- By:
- Publication type:
- Article
Possibility and Impossibility Results for Selective Decommitments.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 3, p. 470, doi. 10.1007/s00145-010-9066-x
- By:
- Publication type:
- Article
Flowchart description of security primitives for controlled physical unclonable functions.
- Published in:
- International Journal of Information Security, 2010, v. 9, n. 5, p. 327, doi. 10.1007/s10207-010-0113-2
- By:
- Publication type:
- Article
Structural Cryptanalysis of SASAS.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 4, p. 505, doi. 10.1007/s00145-010-9062-1
- By:
- Publication type:
- Article
An Analysis of the Blockcipher-Based Hash Functions from PGV.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 4, p. 519, doi. 10.1007/s00145-010-9071-0
- By:
- Publication type:
- Article
A Verifiable Secret Shuffle of Homomorphic Encryptions.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 4, p. 546, doi. 10.1007/s00145-010-9067-9
- By:
- Publication type:
- Article
Long-Term Security and Universal Composability.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 4, p. 594, doi. 10.1007/s00145-010-9068-8
- By:
- Publication type:
- Article
Mean-set attack: cryptanalysis of Sibert et al. authentication protocol.
- Published in:
- Journal of Mathematical Cryptology, 2010, v. 4, n. 2, p. 149, doi. 10.1515/JMC.2010.006
- By:
- Publication type:
- Article
Quantum protocols for zero-knowledge systems.
- Published in:
- Quantum Information Processing, 2010, v. 9, n. 1, p. 37, doi. 10.1007/s11128-009-0127-8
- By:
- Publication type:
- Article
An efficient identification protocol secure against concurrent-reset attacks.
- Published in:
- Journal of Mathematical Cryptology, 2009, v. 3, n. 4, p. 339, doi. 10.1515/JMC.2009.021
- By:
- Publication type:
- Article
New Approaches for Deniable Authentication.
- Published in:
- Journal of Cryptology, 2009, v. 22, n. 4, p. 572, doi. 10.1007/s00145-009-9044-3
- By:
- Publication type:
- Article
Receipt-Freeness for Groth's e-Voting Schemes.
- Published in:
- Journal of Information Science & Engineering, 2009, v. 25, n. 2, p. 517
- By:
- Publication type:
- Article