期刊文献+
共找到158篇文章
< 1 2 8 >
每页显示 20 50 100
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
1
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
在线阅读 下载PDF
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
2
作者 Jin Wang Wei Ou +3 位作者 Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1805-1819,共15页
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien... Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification. 展开更多
关键词 Blockchain privacy protection zero-knowledge proof smart contract
在线阅读 下载PDF
Privacy-preserving analytics for the securitization market: a zero-knowledge distributed ledger technology application 被引量:1
3
作者 Sophie Meralli 《Financial Innovation》 2020年第1期129-148,共20页
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog... A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data. 展开更多
关键词 Structured finance SECURITIZATION Blockchain zero-knowledge proofs Distributed ledger technology PRIVACY Data analytics
在线阅读 下载PDF
隐私计算中的高性能加密算法研究
4
作者 姚文龙 毛华彬 傅彦铭 《信息安全研究》 北大核心 2026年第3期274-283,共10页
在数字经济快速发展的背景下,如何在保障数据隐私的前提下高效利用数据成为当前科技发展的核心挑战.隐私计算作为解决“数据可用不可见”问题的关键技术体系逐步走向实际应用.其中,同态加密、零知识证明和安全多方计算作为3大核心加密技... 在数字经济快速发展的背景下,如何在保障数据隐私的前提下高效利用数据成为当前科技发展的核心挑战.隐私计算作为解决“数据可用不可见”问题的关键技术体系逐步走向实际应用.其中,同态加密、零知识证明和安全多方计算作为3大核心加密技术,在理论构建与工程实现方面取得了显著进展,并在高性能计算环境中展现出广泛应用潜力.围绕上述3类高性能加密算法展开系统综述,介绍算法研究进展,并重点从计算效率、通信开销与高性能计算环境适配性3个维度进行分析.结果表明:同态加密适用于无需交互的数据处理任务,具备较强的自治性,但计算与通信开销较高;零知识证明在验证效率上表现突出,适合高并发验证场景,但证明生成仍面临性能瓶颈;安全多方计算在多机构协作计算中优势明显,近年通过协议优化与硬件协同实现了工程部署可行性.另外,对3类算法的性能和适用场景进行对比分析,并对未来研究中算法通用性与专用性的动态平衡以及性能、安全与可解释性的多维权衡进行了展望,为后续高性能加密算法设计与应用部署提供参考. 展开更多
关键词 隐私计算 高性能加密算法 同态加密 零知识证明 安全多方计算
在线阅读 下载PDF
A Blockchain-Based Efficient Verification Scheme for Context Semantic-Aware Ciphertext Retrieval
5
作者 Haochen Bao Lingyun Yuan +2 位作者 Tianyu Xie Han Chen Hui Dai 《Computers, Materials & Continua》 2026年第1期550-579,共30页
In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic q... In the age of big data,ensuring data privacy while enabling efficient encrypted data retrieval has become a critical challenge.Traditional searchable encryption schemes face difficulties in handling complex semantic queries.Additionally,they typically rely on honest but curious cloud servers,which introduces the risk of repudiation.Furthermore,the combined operations of search and verification increase system load,thereby reducing performance.Traditional verification mechanisms,which rely on complex hash constructions,suffer from low verification efficiency.To address these challenges,this paper proposes a blockchain-based contextual semantic-aware ciphertext retrieval scheme with efficient verification.Building on existing single and multi-keyword search methods,the scheme uses vector models to semantically train the dataset,enabling it to retain semantic information and achieve context-aware encrypted retrieval,significantly improving search accuracy.Additionally,a blockchain-based updatable master-slave chain storage model is designed,where the master chain stores encrypted keyword indexes and the slave chain stores verification information generated by zero-knowledge proofs,thus balancing system load while improving search and verification efficiency.Finally,an improved non-interactive zero-knowledge proof mechanism is introduced,reducing the computational complexity of verification and ensuring efficient validation of search results.Experimental results demonstrate that the proposed scheme offers stronger security,balanced overhead,and higher search verification efficiency. 展开更多
关键词 Searchable encryption blockchain context semantic awareness zero-knowledge proof
在线阅读 下载PDF
大数据侦查的法律规制路径
6
作者 贺紫荆 杜航 《辽宁警察学院学报》 2026年第1期75-81,共7页
在大数据与人工智能技术快速发展的背景下,大数据侦查已成为现代犯罪治理的重要手段。大数据侦查通过海量数据挖掘、智能算法分析等技术手段,显著提升了侦查工作的精准性和预测预警的时效性。然而,这种技术驱动的侦查方式对传统法治体... 在大数据与人工智能技术快速发展的背景下,大数据侦查已成为现代犯罪治理的重要手段。大数据侦查通过海量数据挖掘、智能算法分析等技术手段,显著提升了侦查工作的精准性和预测预警的时效性。然而,这种技术驱动的侦查方式对传统法治体系提出了严峻挑战。数据算法与司法公正的冲突、侦查权对隐私权的侵蚀、数据对证据规则的冲击等问题也日益凸显。对此,可从规制数据质量以确保决策基础准确、规范算法设计以确保司法决策公正、依据比例原则以保障公民隐私权、创新证据的证明规则以辅助证明案件事实等方面提出法律规制路径。这既为平衡侦查效能与权利保护提供新思路,也为构建安全可靠的大数据侦查体系提供制度保障。最终实现技术理性与法律价值的有机统一,推动大数据侦查在法治轨道上规范发展。 展开更多
关键词 大数据侦查 法律规制 算法 隐私权 证明规则
在线阅读 下载PDF
Membership Proof and Verification in Authenticated Skip Lists Based on Heap 被引量:1
7
作者 Shuanghe Peng Zhige Chen Deen Chen 《China Communications》 SCIE CSCD 2016年第6期195-204,共10页
How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the ... How to keep cloud data intact and available to users is a problem to be solved. Authenticated skip list is an important data structure used in cloud data integrity verification. How to get the membership proof of the element in authenticated skip list efficiently is an important part of authentication. Kaouthar Blibech and Alban Gabillon proposed a head proof and a tail proof algorithms for the membership proof of elements in the authenticated skip list. However, the proposed algorithms are uncorrelated each other and need plateau function. We propose a new algorithm for computing the membership proof for elements in the authenticated skip list by using two stacks, one is for storing traversal chain of leaf node, the other is for storing authentication path for the leaf. The proposed algorithm is simple and effective without needing plateau function. It can also be applicable for other similar binary hash trees. 展开更多
关键词 authenticated skip list max heap membership proof STACK algorithms
在线阅读 下载PDF
Philosophical Study of Scientific Proof
8
作者 Bondarenko Stanislav Borisovich 《Journal of Philosophy Study》 2015年第1期24-28,共5页
The scientific proof is the highest type of the rational proof. The mankind is looking for the best technology of the reasonable demonstration. What is a proof?. What is a scientific proof?. Philosophical investigat... The scientific proof is the highest type of the rational proof. The mankind is looking for the best technology of the reasonable demonstration. What is a proof?. What is a scientific proof?. Philosophical investigations of proofs have the long history. Philosophy is exploring physics, mathematics, astronomy, biology, history, and so on. Science demands strict proofs. Science uses the specific methods as the optimum technologies for the achievement of the truth. Strictness of the proof depends on the aim algorithm: the distribution of the functions between parts of the proof. The beginning stage, the middle parts, and the ending stage are the unit of the proof. Philosophy can make the correct model of the scientific proof only! Science and its methodology develop and the growth of knowledge has not the finish. The rational ideals improve continually. Science is looking for the criterion of the demonstrative strictness. The adaptation algorithm of the scientific method is the best technology for the achievement of the truth. 展开更多
关键词 SCIENCE proof model method UNIT algorithm
在线阅读 下载PDF
基于遗传算法的蓄电池轮胎式装载机优化设计
9
作者 饶俊良 陈子林 《科技创新与应用》 2025年第11期120-123,共4页
为了解决防爆蓄电池轮胎式装载机工作装置在传统设计模式下效率低下、准确性不足的缺陷,通过分析防爆装载机工作装置的各部件间的相互关系和运动规律,以及实际工作环境中的多种约束条件,建立工作装置优化设计的数学模型,利用VC++和MATLA... 为了解决防爆蓄电池轮胎式装载机工作装置在传统设计模式下效率低下、准确性不足的缺陷,通过分析防爆装载机工作装置的各部件间的相互关系和运动规律,以及实际工作环境中的多种约束条件,建立工作装置优化设计的数学模型,利用VC++和MATLAB软件编写基于遗传算法的工作装置优化程序;该程序通过模拟自然选择和遗传机制,经过程序在解空间的多次迭代和寻优求解,关键性能指标的优化比原模型提高11.3%,大大提高产品效率,可为同类型的复杂机构优化设计提供参考和借鉴。 展开更多
关键词 遗传算法 优化设计 防爆装载机 工作装置 数学模型
在线阅读 下载PDF
移动边缘计算中的多层区块链网络数据防篡改方法研究
10
作者 叶惠仙 《成都工业学院学报》 2025年第3期44-49,共6页
研究移动边缘计算中的多层区块链网络数据防篡改方法,有效弥补网络攻击漏洞,降低数据被篡改的风险。构建移动边缘计算中的多层区块链网络数据防篡改架构,边缘层的边缘节点采集边缘计算中产生的数据,发送到边缘区块链中进行存储;边缘区... 研究移动边缘计算中的多层区块链网络数据防篡改方法,有效弥补网络攻击漏洞,降低数据被篡改的风险。构建移动边缘计算中的多层区块链网络数据防篡改架构,边缘层的边缘节点采集边缘计算中产生的数据,发送到边缘区块链中进行存储;边缘区块链组合随机数与网络数据,结合哈希算法与不对称的公钥和私钥,对移动边缘计算中的多层区块链网络数据进行加密,并利用解密方式反向验证数据是否被篡改,阻止危险发生,保障数据私钥泄露后的数据防篡改;中间层中间节点定期将边缘区块链获取的安全数据包发布给中间区块链,并在认证层认证节点作用下完成移动边缘计算数据的安全保护。实验结果说明,所提方法可有效保障移动边缘计算中的多层区块链网络数据安全,避免数据被篡改,同时所提方法应用后数据被篡改次数很低,抗攻击性能强,数据存储无丢失,稳定性好。 展开更多
关键词 区块链 移动边缘计算 防篡改方法 哈希算法 网络数据 私钥加密
在线阅读 下载PDF
基于高效历史工作证明区块链的无人机身份认证方案
11
作者 杜晓玉 张俊杰 +2 位作者 李辉 党兰学 韩志杰 《河南大学学报(自然科学版)》 北大核心 2025年第1期21-31,共11页
当前,无人机身份认证网络存在着密钥泄露、冒充攻击和单点故障等问题.因此,有关研究人员提出将区块链技术与无人机身份认证网络结合起来.但现有基于区块链的无人机身份认证方案中存在着资源消耗大、交易费用高、吞吐量低和交易确认延迟... 当前,无人机身份认证网络存在着密钥泄露、冒充攻击和单点故障等问题.因此,有关研究人员提出将区块链技术与无人机身份认证网络结合起来.但现有基于区块链的无人机身份认证方案中存在着资源消耗大、交易费用高、吞吐量低和交易确认延迟大等问题.为此提出了一种新型的无人机身份认证方案——基于高效历史工作证明区块链的无人机身份认证方案(EPOH).为提升通讯效率,EPOH方案采用了联盟链作为数据存储中心,并通过统计一段时间内各节点转发交易数量的方法来优化节点选举过程.此外还设置了冷却期来避免单个节点连续多次成为领导者,从而保障了系统的去中心化特性.EPOH方案还通过连续哈希证明技术,通过生成区块内的事件次序证明,消除了时钟同步的需要,从而大幅提高共识达成速度.安全分析部分显示出EPOH方案能够抵御恶意分叉的能力.实验分析部分验证了EPOH方案能够有效提高系统吞吐量,降低交易确认延迟,显著降低资源消耗和交易成本. 展开更多
关键词 无人机身份认证方案 区块链 共识算法 历史工作证明
原文传递
基于记忆策略的元解释学习
12
作者 王榕 田聪 +2 位作者 孙军 于斌 段振华 《软件学报》 北大核心 2025年第8期3477-3493,共17页
元解释学习(meta-interpretive learning,MIL)是一种归纳逻辑程序设计(inductive logic programming,ILP)方法,旨在从一组实例、元规则和其他背景知识中学习一个程序.MIL采用深度优先和失败驱动策略在程序空间中搜索适当的子句以生成程... 元解释学习(meta-interpretive learning,MIL)是一种归纳逻辑程序设计(inductive logic programming,ILP)方法,旨在从一组实例、元规则和其他背景知识中学习一个程序.MIL采用深度优先和失败驱动策略在程序空间中搜索适当的子句以生成程序.事实上,这种机制不可避免地引发了对相同目标重复证明的问题.提出一种剪枝策略,该策略利用Prolog内置的数据库机制来存储未能达成的目标及其对应的错误信息,从而有效避免冗余的证明过程.此后,这些累积的错误信息能够作为指导,帮助MIL系统在未来的学习过程中进行优化和调整.证明剪枝算法的正确性,并在理论上计算程序空间的缩减比例.将所提出的方法应用于两个现有的MIL系统Metagol和Metagol_(AI),从而产生了两个新的MIL系统MetagolF和Metagol_(AI_F).在4个不同任务上的实证结果表明,所提出的策略可以显著减少学习相同程序的时间消耗. 展开更多
关键词 元解释学习 冗余证明 记忆策略 剪枝算法 归纳逻辑程序设计
在线阅读 下载PDF
一种适用于分布式电力交易的安全高效区块链共识算法 被引量:1
13
作者 房永浩 姚中原 +1 位作者 李敏 斯雪明 《计算机工程》 北大核心 2025年第8期250-261,共12页
分布式电力交易成为电力能源交易的未来发展趋势,区块链凭借其技术特性为分布式电力交易中缺乏监管机制、交易成本过高、信息规则不明等问题提供解决思路。然而,随着分布式电力交易规模逐渐增大,区块链系统吞吐量降低,这也间接限制了分... 分布式电力交易成为电力能源交易的未来发展趋势,区块链凭借其技术特性为分布式电力交易中缺乏监管机制、交易成本过高、信息规则不明等问题提供解决思路。然而,随着分布式电力交易规模逐渐增大,区块链系统吞吐量降低,这也间接限制了分布式电力交易的成交速度。为此,提出一种适用于分布式电力交易的高效安全的区块链共识算法。基于分布式电力交易网络内节点的历史交易特性,使用聚类算法将共识网络规划为多共识集双层网络结构,并采用双层共识流程提升共识的并行性。同时,设计高效的单共识集内领导节点选举策略,可以快速确定表现良好、性能较优的领导节点。最后,引入结合零知识证明与密钥分享的认证方法,进一步降低恶意节点参与共识的可能性。实验结果表明,所提共识算法的抗拜占庭节点数量可以抵御双花攻击等多种区块链攻击,能够显著降低共识通信开销与时延,有效提高系统吞吐量。 展开更多
关键词 区块链 分布式能源交易 共识算法 零知识证明 密钥分享
在线阅读 下载PDF
Existence of 3-round zero-knowledge proof systems for NP 被引量:2
14
作者 LI HongDat LI Bao 《Science in China(Series F)》 2008年第3期273-282,共10页
This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new intera... This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new interactive proof model, we construct a 3-round zero-knowledge proof system for graph 3-coloring under standard assumptions. Our protocol is a non-black-box zero-knowledge proof because we adopt a special strategy to prove the zero-knowledge property. Consequently, our construction shows the existence of 3-round non-black-box zero-knowledge proof for all languages in NP under the DDH assumption. 展开更多
关键词 interactive proof zero-knowledge proof non-black-box simulation DDH assumption
原文传递
基于SM2的抗泄露群签名
15
作者 刘隆臻 郑大彬 +1 位作者 谭作文 王伟嘉 《密码学报(中英文)》 北大核心 2025年第6期1265-1283,共19页
群签名是一种能够保护签名成员隐私并确保必要时可追溯签名的密码学机制.然而,现有群签名方案大多依赖于国外密码算法.本文提出了一种基于国产SM2算法的群签名方案,在实现不可伪造性、匿名性和可追溯性等标准群签名方案安全性目标的同时... 群签名是一种能够保护签名成员隐私并确保必要时可追溯签名的密码学机制.然而,现有群签名方案大多依赖于国外密码算法.本文提出了一种基于国产SM2算法的群签名方案,在实现不可伪造性、匿名性和可追溯性等标准群签名方案安全性目标的同时,引入了抗泄露性和管理员去中心化两大创新特性.利用双线性配对技术,在有界泄露模型下构建了抗泄露群签名方案,通过部分匿名确认算法增强了签名的匿名性和部分可确认性.此外,引入分布式秘密共享机制和加法同态加密方案,实现了多管理员群签名管理,达到了去中心化管理的目的.在效率方面,方案在签名时仅需3次点乘运算,验证时仅需2次双线性配对运算,既保留了SM2算法的高效性,又实现了可容忍泄露率达到1/2的抗泄露特性. 展开更多
关键词 SM2算法 交互式证明系统 抗泄露模型 抗泄露群签名
在线阅读 下载PDF
自动化决策算法中的个人信息侵权因果关系认定 被引量:1
16
作者 姚朱沁 《网络安全与数据治理》 2025年第3期96-102,共7页
自动化决策算法与传统侵权法体系之间存在适用上的矛盾,亟须通过因果关系的认定予以化解。对此,应在坚持传统的因果关系构成要件认定标准基础上,结合比例因果关系理论,对各因素在损害结果中的贡献进行量化分析。针对单一信息处理者场景... 自动化决策算法与传统侵权法体系之间存在适用上的矛盾,亟须通过因果关系的认定予以化解。对此,应在坚持传统的因果关系构成要件认定标准基础上,结合比例因果关系理论,对各因素在损害结果中的贡献进行量化分析。针对单一信息处理者场景,可以在疑难案件中引入“合理盖然性”标准降低受害人举证难度;对于多主体参与的情形,通过类推适用共同危险行为制度实现举证责任倒置,但需以整体行为与损害的因果关系证成为前提。此法律框架有助于在多方数据处理和信息流转背景下,更有效地解决技术复杂性带来的法律挑战,推动信息保护与技术发展的平衡。 展开更多
关键词 因果关系 算法侵权 相当性 证明责任分配 共同危险行为
在线阅读 下载PDF
Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi
17
作者 Ahmed I.Alutaibi 《Computers, Materials & Continua》 2025年第10期875-903,共29页
The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital ... The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes,particularly in Decentralized Finance(DeFi)systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification.This paper proposes a quantum-resilient,blockchain-based identity verification framework designed to address critical challenges in privacy preservation,scalability,and post-quantum security.The proposed model integrates Post-quantum Cryptography(PQC),specifically lattice-based cryptographic primitives,with Decentralized Identifiers(DIDs)and Zero-knowledge Proofs(ZKPs)to ensure verifiability,anonymity,and resistance to quantum attacks.A dual-layer architecture is introduced,comprising an identity layer for credential generation and validation,and an application layer for DeFi protocol integration.To evaluate its performance,the framework is tested on multiple real-world DeFi platforms using metrics such as verification latency,throughput,attack resistance,energy efficiency,and quantum attack simulation.The results demonstrate that the proposed framework achieves 90%latency reduction and over 35%throughput improvement compared to traditional blockchain identity solutions.It also exhibits a high quantum resistance score(95/100),with successful secure verification under simulated quantum adversaries.The revocation mechanism—implemented using Merkle-tree-based proofs—achieves average response times under 40 ms,and the system maintains secure operations with energy consumption below 9 J per authentication cycle.Additionally,the paper presents a security and cost tradeoff analysis using ZKP schemes such as Bulletproofs and STARKs,revealing superior bits-per-byte efficiency and reduced proof sizes.Real-world adoption scenarios,including integration with six major DeFi protocols,indicate a 25%increase in verified users and a 15%improvement in Total Value Locked(TVL).The proposed solution is projected to remain secure until 2041(basic version)and 2043(advanced version),ensuring long-term sustainability and future-proofing against evolving quantum threats.This work establishes a scalable,privacy-preserving identity model that aligns with emerging post-quantum security standards for decentralized ecosystems. 展开更多
关键词 Quantum-resistant cryptography decentralized identity DeFi blockchain zero-knowledge proofs post-quantum security lattice-based encryption
在线阅读 下载PDF
Secure and Privacy-Preserving Cross-Departmental Computation Framework Based on BFV and Blockchain
18
作者 Peng Zhao Yu Du 《Journal of Electronic Research and Application》 2025年第6期207-217,共11页
As the demand for cross-departmental data collaboration continues to grow,traditional encryption methods struggle to balance data privacy with computational efficiency.This paper proposes a cross-departmental privacy-... As the demand for cross-departmental data collaboration continues to grow,traditional encryption methods struggle to balance data privacy with computational efficiency.This paper proposes a cross-departmental privacy-preserving computation framework based on BFV homomorphic encryption,threshold decryption,and blockchain technology.The proposed scheme leverages homomorphic encryption to enable secure computations between sales,finance,and taxation departments,ensuring that sensitive data remains encrypted throughout the entire process.A threshold decryption mechanism is employed to prevent single-point data leakage,while blockchain and IPFS are integrated to ensure verifiability and tamper-proof storage of computation results.Experimental results demonstrate that with 5,000 sample data entries,the framework performs efficiently and is highly scalable in key stages such as sales encryption,cost calculation,and tax assessment,thereby validating its practical feasibility and security. 展开更多
关键词 Homomorphic encryption zero-knowledge proof Blockchain Cross-departmental privacy-preserving computation
在线阅读 下载PDF
A lightweight dual authentication scheme for V2V communication in 6G-based vanets
19
作者 Xia Feng Yaru Wang +1 位作者 Kaiping Cui Liangmin Wang 《Digital Communications and Networks》 2025年第4期1224-1235,共12页
The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are ... The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks(VANETs).However,the messages transmitted over the public channel in the open and dynamic VANETs are vulnerable to malicious attacks.Although numerous researchers have proposed authentication schemes to enhance the security of Vehicle-to-Vehicle(V2V)communication,most existing methodologies face two significant challenges:(1)the majority of the schemes are not lightweight enough to support realtime message interaction among vehicles;(2)the sensitive information like identity and position is at risk of being compromised.To tackle these issues,we propose a lightweight dual authentication protocol for V2V communication based on Physical Unclonable Function(PUF).The proposed scheme accomplishes dual authentication between vehicles by the combination of Zero-Knowledge Proof(ZKP)and MASK function.The security analysis proves that our scheme provides both anonymous authentication and information unlinkability.Additionally,the performance analysis demonstrates that the computation overhead of our scheme is approximately reduced 23.4% compared to the state-of-the-art schemes.The practical simulation conducted in a 6G network environment demonstrates the feasibility of 6G-based VANETs and their potential for future advancements. 展开更多
关键词 Vehicular ad-hoc network Identity authentication Physical unclonable function MASK function zero-knowledge proof 6G wireless communication technology
在线阅读 下载PDF
Memorizable Interactive Proof and Zero-Knowledge Proof Systems
20
作者 NingChen Jia-WeiRong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期936-941,共6页
Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have... Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have been designed and applied in practice. In this paper, a simple memorizable zero-knowledge protocol is proposed for graph non-isomorphism problem, based on the memorizable interactive proof system, which is extended from the original definition of interactive proof and is more applicable in reality. Keywords interactive proof - zero-knowledge proof - memorizable interactive proof - memorizable zero-knowledge proof This work was supported by the ministry of Science and Technology of China (Grant No.2001CCA03000), and the National Natural Science Foundation of China (Grant No.60273045).Ning Chen received his B.S. degree from Fudan University in 2001. Now he is a master candidate of Department of Computer Science, Fudan University. His research interests include computational complexity, computational cryptography, algorithm design and analysis.Jia-Wei Rong received her B.S. degree from Fudan University in 2002. Now she is a master candidate of Department of Computer Science, Fudan University. Her research interests include computational cryptography, machine learning, artificial intelligence. 展开更多
关键词 interactive proof zero-knowledge proof memorizable interactive proof memorizable zero-knowledge proof
原文传递
上一页 1 2 8 下一页 到第
使用帮助 返回顶部