期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Algebraic Construction for Zero-Knowledge Sets
1
作者 薛锐 李宁辉 李江滔 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第2期166-175,共10页
Zero knowledge sets is a new cryptographic primitive introduced by Micali, Rabin, and Kilian in FOCS 2003. It has been intensively studied recently. However all the existing ZKS schemes follow the basic structure by M... Zero knowledge sets is a new cryptographic primitive introduced by Micali, Rabin, and Kilian in FOCS 2003. It has been intensively studied recently. However all the existing ZKS schemes follow the basic structure by Micali et al. That is, the schemes employ the Merkle tree as a basic structure and mercurial commitments as the commitment units to nodes of the tree. The proof for any query consists of an authentication chain. We propose in this paper a new algebraic scheme that is completely different from all the existing schemes. Our new scheme is computationally secure under the standard strong RSA assumption. Neither mercurial commitments nor tree structure is used in the new construction. In fact, the prover in our construction commits the desired set without any trapdoor information, which is another key important difference from the previous approaches. 展开更多
关键词 zero knowledge set Merkle tree accumulator strong RSA assumption random oracle
原文传递
Research on secure buyer-seller watermarking protocol
2
作者 Liu Quan Chen Zheng Zhou Zude 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期370-376,384,共8页
A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and t... A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party. 展开更多
关键词 watermarking protocol zero knowledge proof distributed certification authorities.
下载PDF
EVchain: An Anonymous Blockchain-Based System for Charging–Connected Electric Vehicles 被引量:3
3
作者 Shiyuan Xu Xue Chen Yunhua He 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第6期845-856,共12页
Purchases of electric vehicles have been increasing in recent years. These vehicles differ from traditional fossil-fuel-based vehicles especially in the time consumed to keep them running. Electric-Vehicle-charging Se... Purchases of electric vehicles have been increasing in recent years. These vehicles differ from traditional fossil-fuel-based vehicles especially in the time consumed to keep them running. Electric-Vehicle-charging Service Providers(EVSPs) must arrange reasonable charging times for users in advance. Most EVSP services are based on third-party platforms, but reliance on third-party platforms creates a lack of security, leaving users vulnerable to attacks and user-privacy leakages. In this paper, we propose an anonymous blockchain-based system for charging-connected electric vehicles that eliminates third-party platforms through blockchain technology and the establishment of a multi-party security system between electric vehicles and EVSPs. In our proposed system, digital certificates are obtained by completing distributed Public Key Infrastructure(distributed-PKI) identity registration,with the user registration kept separate from the verification process, which eliminates dependence on the EVSP for information security. In the verification process, we adopt smart contracts to solve problems associated with centralized verification and opaque services. Furthermore, we utilize zero-knowledge proof and ring-signature superposition to realize completely anonymous verification, which ensures undeniability and unforgeability with no detriment to anonymity. The evaluation results show that the user anonymity, information authenticity, and system security of our system fulfill the necessary requirements. 展开更多
关键词 blockchain Electric Vehicles(EV) zero knowledge proof distributed Public Key Infrastructure(distributed-PKI) ring signature smart contract
原文传递
A Secure Elliptic Curve-Based RFID Protocol 被引量:3
4
作者 Santi Martínez Magda Valls +2 位作者 Concepció Roig Josep M. Miret Francesc Giné 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第2期309-318,共10页
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high c... Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high confidence and efficient privacy protocols are urgently needed. Previous studies in the literature proposed schemes that are proven to be secure, but they have scalability problems. A feasible and scalable protocol to guarantee privacy is presented in this paper. The proposed protocol uses elliptic curve cryptography combined with a zero knowledge-based authentication scheme. An analysis to prove the system secure, and even forward secure is also provided. 展开更多
关键词 elliptic curve cryptography forward security RFID zero knowledge
原文传递
Primitives towards verifiable computation: a survey
5
作者 Haseeb AHMAD Licheng WANG +4 位作者 Haibo HONG Jing LI Hassan DAWOOD Manzoor AHMED Yixian YANG 《Frontiers of Computer Science》 SCIE EI CSCD 2018年第3期451-478,共28页
Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations ... Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations to securely outsource expensive computations to untrusted service providers, while acquiring the publicly or privately verifiable results. Many mainstream solutions have been proposed to address the diverse problems within the VC domain. Some of them imposed assumptions over performed computations, while the others took advantage of interactivity /non-interactivity, zero knowledge proofs, and arguments. Further proposals utilized the powers of probabilistic checkable or computationally sound proofs. In this survey, we present a chronological study and classify the VC proposals based on their adopted domains. First, we provide a broader overview of the theoretical advancements while critically analyzing them. Subsequently, we present a comprehensive view of their utilization in the state of the art VC approaches. Moreover, a brief overview of recent proof based VC systems is also presented that lifted up the VC domain to the verge of practicality. We use the presented study and reviewed resuits to identify the similarities and alterations, modifications, and hybridization of different approaches, while comparing their advantages and reporting their overheads. Finally, we discuss implementation of such VC based systems, their applications, and the likely future directions. 展开更多
关键词 verifiable computation cloud computation INTERACTIVE NON-INTERACTIVE zero knowledge probabilisticcheckable proofs computationally sound proofs
原文传递
Novel Ω-protocols for NP
6
作者 DENG Yi LIN DongDai 《Science in China(Series F)》 2008年第1期40-52,共13页
Ω-protocols, introduced by Garay, Mackenzie and Yang, is a variant of S-protocols with online extractor which is a useful tool to overcome the nest effect in concurrent scenario. In this work, we construct an Ω-prot... Ω-protocols, introduced by Garay, Mackenzie and Yang, is a variant of S-protocols with online extractor which is a useful tool to overcome the nest effect in concurrent scenario. In this work, we construct an Ω-protocol for Hamiltonian cycle problem, and therefore, it allows us to present Ω-protocol for any NP relation. For most general NP relations, our construction of Ω-protocols is much more efficient than the informal one described by Garay et ah and we believe that the method for our construction may be of independent interest. 展开更多
关键词 concurrent zero knowledge Ω-protocols Σ-protocols Hamiltonian cycle
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部