期刊文献+
共找到42篇文章
< 1 2 3 >
每页显示 20 50 100
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
1
作者 Jin Wang Wei Ou +3 位作者 Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1805-1819,共15页
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien... Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification. 展开更多
关键词 Blockchain privacy protection zero-knowledge proof smart contract
下载PDF
Privacy-preserving analytics for the securitization market: a zero-knowledge distributed ledger technology application 被引量:1
2
作者 Sophie Meralli 《Financial Innovation》 2020年第1期129-148,共20页
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog... A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data. 展开更多
关键词 Structured finance SECURITIZATION Blockchain zero-knowledge proofs Distributed ledger technology PRIVACY Data analytics
下载PDF
拥有RSA数字签名的零知识证明 被引量:7
3
作者 王尚平 王育民 +1 位作者 王晓峰 秦波 《通信学报》 EI CSCD 北大核心 2004年第1期30-33,共4页
提出了一种拥有RSA数字签名的零知识证明方案。该方案给出了防止RSA数字签名任意传播的一种新方法——签名者不直接提供对信息M的签名,而是提供拥有对该信息的数字签名的一个零知识证明。该方案是可证实数字签名的改进,但比证实签名简... 提出了一种拥有RSA数字签名的零知识证明方案。该方案给出了防止RSA数字签名任意传播的一种新方法——签名者不直接提供对信息M的签名,而是提供拥有对该信息的数字签名的一个零知识证明。该方案是可证实数字签名的改进,但比证实签名简单且不需要第三方的参与。本文中给的方案,可广泛应用于信息产品的版权保护中。 展开更多
关键词 零知识证明 rsa 数字签名 密码学
下载PDF
可公开验证的ElGamal/RSA加密 被引量:2
4
作者 伍前红 王继林 +1 位作者 袁素春 王育民 《电子与信息学报》 EI CSCD 北大核心 2005年第4期608-611,共4页
可公开验证加密允许任何实体验证加密的消息和先前承诺的秘密一样,但不会泄漏明文的任何信息。这在 公平交换、防欺骗的秘密分享和安全多方计算中有重要应用。该文分别给出可公开验证的ElGamal加密和RSA加 密方案。其中前者是Stalder方... 可公开验证加密允许任何实体验证加密的消息和先前承诺的秘密一样,但不会泄漏明文的任何信息。这在 公平交换、防欺骗的秘密分享和安全多方计算中有重要应用。该文分别给出可公开验证的ElGamal加密和RSA加 密方案。其中前者是Stalder方案的改进,改进后的方案是语义安全的而Stalder方案达不到语义安全性。同时将该 方案推广到了多个接受者的情形,最后给出了高效的可公开验证RSA加密方案。 展开更多
关键词 可公开验证加密 零知识证明 bit承诺 rsa体制 ElGarnal体制
下载PDF
防欺诈的二方共享RSA密钥 被引量:6
5
作者 王宏 肖鸿 肖国镇 《软件学报》 EI CSCD 北大核心 2000年第10期1344-1347,共4页
二方共享 RSA密钥产生协议是很重要的一个密码协议 ,在密钥托管及其他许多方面都有重要的应用 .Niv Gilboa提出了一个二方共享 RSA密钥产生协议 ,其效率较高 ,但不能防止任何一方恶意欺骗 .基于该协议 ,给出了一个能防欺诈的二方共享 RS... 二方共享 RSA密钥产生协议是很重要的一个密码协议 ,在密钥托管及其他许多方面都有重要的应用 .Niv Gilboa提出了一个二方共享 RSA密钥产生协议 ,其效率较高 ,但不能防止任何一方恶意欺骗 .基于该协议 ,给出了一个能防欺诈的二方共享 RSA密钥产生协议 . 展开更多
关键词 门限密码学 二方共享rsa密钥 密码协议
下载PDF
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
6
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
下载PDF
A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts
7
作者 Xiaohui Yang Kun Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1843-1859,共17页
Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of d... Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of data cannot be guaranteed,resulting in low enthusiasm of participants.A fair and trusted medical data trading scheme based on smart contracts is proposed,which aims to encourage participants to be honest and improve their enthusiasm for participation.The scheme uses zero-knowledge range proof for trusted verification,verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,and realizes privacy protection.At the same time,the game pricing strategy selects the best revenue strategy for all parties involved and realizes the fairness and incentive of the transaction price.The smart contract is used to complete the verification and game bargaining process,and the blockchain is used as a distributed ledger to record the medical data transaction process to prevent data tampering and transaction denial.Finally,by deploying smart contracts on the Ethereum test network and conducting experiments and theoretical calculations,it is proved that the transaction scheme achieves trusted verification and fair bargaining while ensuring privacy protection in a decentralized environment.The experimental results show that the model improves the credibility and fairness of medical data transactions,maximizes social benefits,encourages more patients and medical institutions to participate in the circulation of medical data,and more fully taps the potential value of medical data. 展开更多
关键词 Blockchain data transactions zero-knowledge proof game pricing
下载PDF
A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain
8
作者 Yurong Luo Wei You +3 位作者 Chao Shang Xiongpeng Ren Jin Cao Hui Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2237-2260,共24页
The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among th... The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants. 展开更多
关键词 IoT data sharing zero-knowledge proof authentication privacy preserving blockchain
下载PDF
基于RSA的防欺诈多秘密共享方案 被引量:2
9
作者 郭现峰 《计算机工程与应用》 CSCD 北大核心 2009年第17期9-10,79,共3页
针对秘密共享方案进行了分析和研究,指出基于二元单向函数和Shamir(t,n)门限方案的YCH多秘密共享方案无法有效防止欺诈,进而提出了一个基于RSA的防欺诈的多秘密共享方案。该方案在保留了YCH方案的优良特性同时,利用秘密片段和认证片段... 针对秘密共享方案进行了分析和研究,指出基于二元单向函数和Shamir(t,n)门限方案的YCH多秘密共享方案无法有效防止欺诈,进而提出了一个基于RSA的防欺诈的多秘密共享方案。该方案在保留了YCH方案的优良特性同时,利用秘密片段和认证片段信息的模余关系来检测欺诈者,具有较强的实用性。 展开更多
关键词 多秘密共享 rsa 防欺诈 SHAMIR
下载PDF
基于RSA的前向安全的防欺诈的门限数字签名方案
10
作者 温翔 袁丁 《计算机应用与软件》 CSCD 北大核心 2008年第6期280-282,共3页
以RSA数字签名方案和前向安全的理论为基础,结合Feldman可验证的秘密共享方案,提出了一种基于RSA的前向安全和防欺诈的门限数字签名方案。该方案中用于数字签名的私有密钥由一个单向函数控制随时间的推移不断更新,而公有密钥保持不变,... 以RSA数字签名方案和前向安全的理论为基础,结合Feldman可验证的秘密共享方案,提出了一种基于RSA的前向安全和防欺诈的门限数字签名方案。该方案中用于数字签名的私有密钥由一个单向函数控制随时间的推移不断更新,而公有密钥保持不变,即使攻击者获得了某个时期的私钥,他也无法伪造该时期之前的签名。该方案在签名过程中溶入了部分签名和防欺骗的秘密共享方案,相比于现有的RSA签名方案,该方案具有更高的安全性。 展开更多
关键词 rsa 前向安全 防欺诈 门限 部分签名
下载PDF
一种改进的RSA快速身份认证方案 被引量:1
11
作者 唐文龙 《大众科技》 2013年第2期20-22,共3页
随着信息系统集成技术的日益普及,系统的安全性问题日益突出,通过使用基于基于零知识身份认证的密钥协商方案,将零知识证明与RSA加密算法相结合,既实现了隐藏认证节点的私有信息。分析表明该方案具有较高的安全性,系统的可靠性健壮性得... 随着信息系统集成技术的日益普及,系统的安全性问题日益突出,通过使用基于基于零知识身份认证的密钥协商方案,将零知识证明与RSA加密算法相结合,既实现了隐藏认证节点的私有信息。分析表明该方案具有较高的安全性,系统的可靠性健壮性得到了加强。 展开更多
关键词 身份认证 零知识证明 rsa
下载PDF
基于RSA的ElGamal型有序多重数字签名方案 被引量:4
12
作者 罗丽平 施荣华 刘宇 《计算机工程与应用》 CSCD 北大核心 2006年第1期120-121,137,共3页
提出了一种基于RSA的ElGamal型有序多重数字签名方案。在该方案中消息以密文的形式发送给签名者,在密钥生成部分采用零知识证明,并且允许多个用户顺序地对某一份文件进行签名,然后构成一份群体签名。简化了签名者之间的接口,减少了通信... 提出了一种基于RSA的ElGamal型有序多重数字签名方案。在该方案中消息以密文的形式发送给签名者,在密钥生成部分采用零知识证明,并且允许多个用户顺序地对某一份文件进行签名,然后构成一份群体签名。简化了签名者之间的接口,减少了通信成本,可以有效地防止内部成员的欺诈行为,因而更具安全性和实用性。 展开更多
关键词 有序多重签名 rsa 零知识证明 离散对数 安全性
下载PDF
基于RSA的零知识水印验证协议
13
作者 郑晶 汤光明 王舰 《计算机工程与应用》 CSCD 北大核心 2008年第14期88-90,共3页
提出了一种基于RSA公钥密码体制的零知识水印验证协议,以解决通常的水印检测方案泄漏与水印相关的敏感信息的问题。协议利用公钥加密对水印及水印嵌入位置的水印化数据进行盲化处理,通过判断它们之间相关性的方法实现了版权水印的公开... 提出了一种基于RSA公钥密码体制的零知识水印验证协议,以解决通常的水印检测方案泄漏与水印相关的敏感信息的问题。协议利用公钥加密对水印及水印嵌入位置的水印化数据进行盲化处理,通过判断它们之间相关性的方法实现了版权水印的公开验证。同时,对如何抵抗骗局攻击进行了研究,提出了在协议执行过程中限制证明者P、验证者V对外通信的方法抵抗该类攻击。 展开更多
关键词 数字水印 水印验证 零知识证明 rsa
下载PDF
基于RSA电子现金支付系统的研究与实现 被引量:2
14
作者 梁俏权 王勋 《计算机工程》 CAS CSCD 北大核心 2003年第14期189-191,共3页
在分析现有电子现金技术的基础上,提出一种安全的、方便的电子现金支付系统实现方案。该方案利用求模算法的性质,只使用少量的公钥,就能满足电子现金的公钥需求;并利用盲签名和直接签名,解决系统的找零问题。最后通过一个系统原型... 在分析现有电子现金技术的基础上,提出一种安全的、方便的电子现金支付系统实现方案。该方案利用求模算法的性质,只使用少量的公钥,就能满足电子现金的公钥需求;并利用盲签名和直接签名,解决系统的找零问题。最后通过一个系统原型的实现,证明该方案的可行性。 展开更多
关键词 rsa盲签名 电子现金 匿名性 零知识证明
下载PDF
对一个拥有RSA数字签名的零知识证明的分析
15
作者 徐刚 魏薇 《徐州工程学院学报(社会科学版)》 2007年第12期10-12,共3页
目前拥有RSA数字签名的零知识证明的两个方案给出了防止RSA数字签名任意传播的一种新方法,但其中第一个方案并不是那样安全.文章指出在随机oracle模型下,当公钥的值较小时,一个不拥有RSA数字签名的证明者能够欺骗验证者.
关键词 零知识证明 rsa签名 密码
下载PDF
Publicly Verifiable Encryption Scheme for RSA
16
作者 JIA Xiao-yun LUO Shou-shan +1 位作者 CHEN Ping YUAN Chao-wei 《通讯和计算机(中英文版)》 2007年第1期23-26,34,共5页
关键词 计算机 安全保护 密码 rsa
下载PDF
基于非对称加密区块链的双创数据交互策略 被引量:2
17
作者 王克 《电子设计工程》 2023年第7期86-90,共5页
传统的数据共享平台通过单一框架策略对数据传输的安全性进行保护,但数据传输速度较慢,且有泄露的风险,难以满足当前的创新创业数据共享需求。针对传统数据传输策略存在的不足,基于区块链技术搭建了双创数据共享平台。在数据加解密模块... 传统的数据共享平台通过单一框架策略对数据传输的安全性进行保护,但数据传输速度较慢,且有泄露的风险,难以满足当前的创新创业数据共享需求。针对传统数据传输策略存在的不足,基于区块链技术搭建了双创数据共享平台。在数据加解密模块中,对非对称加密算法RSA加以改进,构建了DES-RSA混合加密算法,使其在提高处理速度的同时还兼顾了综合性能。同时通过采用三数据广播的方式对数据进行防篡改保护,从而可避免因密钥泄露而导致的恶意篡改。数据封装完毕后,应用PBFT共识机制保证了局域网环境下数据传输的鲁棒性。实验测试结果表明,所设计的加解密算法性能较为理想,数据防篡改率可达99.9%以上,且数据传输鲁棒性、可靠性也较高。 展开更多
关键词 数据共享 rsa DES 数据防篡改 PBFT共识机制 区块链
下载PDF
An Effective Security Comparison Protocol in Cloud Computing
18
作者 Yuling Chen Junhong Tao +2 位作者 Tao Li Jiangyuan Cai Xiaojun Ren 《Computers, Materials & Continua》 SCIE EI 2023年第6期5141-5158,共18页
With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses ... With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses privacy and security challenges.Such challenges can be solved using secure multi-party computation(SMPC),but this still exposes more security issues.In cloud computing using SMPC,clients need to process their data and submit the processed data to the cloud server,which then performs the calculation and returns the results to each client.Each client and server must be honest.If there is cooperation or dishonest behavior between clients,some clients may profit from it or even disclose the private data of other clients.This paper proposes the SMPC based on a Partially-Homomorphic Encryption(PHE)scheme in which an addition homomorphic encryption algorithm with a lower computational cost is used to ensure data comparability and Zero-Knowledge Proof(ZKP)is used to limit the client’s malicious behavior.In addition,the introduction of Oblivious Transfer(OT)technology also ensures that the semi-honest cloud server knows nothing about private data,so that the cloud server of this scheme can calculate the correct data in the case of malicious participant models and safely return the calculation results to each client.Finally,the security analysis shows that the scheme not only ensures the privacy of participants,but also ensures the fairness of the comparison protocol data. 展开更多
关键词 Secure comparison protocols zero-knowledge proof homomorphic encryption cloud computing
下载PDF
Existence of 3-round zero-knowledge proof systems for NP 被引量:2
19
作者 LI HongDat LI Bao 《Science in China(Series F)》 2008年第3期273-282,共10页
关键词 interactive proof zero-knowledge proof non-black-box simulation DDH assumption
原文传递
Memorizable Interactive Proof and Zero-Knowledge Proof Systems
20
作者 NingChen Jia-WeiRong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期936-941,共6页
Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have... Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have been designed and applied in practice. In this paper, a simple memorizable zero-knowledge protocol is proposed for graph non-isomorphism problem, based on the memorizable interactive proof system, which is extended from the original definition of interactive proof and is more applicable in reality. Keywords interactive proof - zero-knowledge proof - memorizable interactive proof - memorizable zero-knowledge proof This work was supported by the ministry of Science and Technology of China (Grant No.2001CCA03000), and the National Natural Science Foundation of China (Grant No.60273045).Ning Chen received his B.S. degree from Fudan University in 2001. Now he is a master candidate of Department of Computer Science, Fudan University. His research interests include computational complexity, computational cryptography, algorithm design and analysis.Jia-Wei Rong received her B.S. degree from Fudan University in 2002. Now she is a master candidate of Department of Computer Science, Fudan University. Her research interests include computational cryptography, machine learning, artificial intelligence. 展开更多
关键词 interactive proof zero-knowledge proof memorizable interactive proof memorizable zero-knowledge proof
原文传递
上一页 1 2 3 下一页 到第
使用帮助 返回顶部