期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain
1
作者 Jin Wang Wei Ou +3 位作者 Osama Alfarraj Amr Tolba Gwang-Jun Kim Yongjun Ren 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1805-1819,共15页
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficien... Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy protection.And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is verified.In order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block verification.There is no need to put the whole transaction on the chain when verifying block data.It just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for verification.Moreover,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the block.When the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the chain.So,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification. 展开更多
关键词 Blockchain privacy protection zero-knowledge proof smart contract
下载PDF
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
2
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
下载PDF
Privacy-preserving analytics for the securitization market: a zero-knowledge distributed ledger technology application 被引量:1
3
作者 Sophie Meralli 《Financial Innovation》 2020年第1期129-148,共20页
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog... A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technology to alleviate asymmetry of information in the asset-backed securitization market.To frame this inquiry,we conducted market data analyses,a review of prior literature,stakeholder interviews with investors,originators and security issuers and collaboration with blockchain engineers and researchers.We introduce a new system which could enable all market participants in the securitization lifecycle(e.g.investors,rating agencies,regulators and security issuers)to interact on a unique decentralized platform while maintaining the privacy of loan-level data,therefore providing the industry with timely analytics and performance data.Our platform is powered by zkLedger(Narula et al.2018),a zero-knowledge protocol developed by the MIT Media Lab and the first system that enables participants of a distributed ledger to run publicly verifiable analytics on masked data. 展开更多
关键词 Structured finance SECURITIZATION Blockchain zero-knowledge proofs Distributed ledger technology PRIVACY Data analytics
下载PDF
零知识证明递归与复合技术研究综述
4
作者 张宗洋 周子博 邓燚 《计算机学报》 EI CAS CSCD 北大核心 2024年第10期2466-2490,共25页
零知识证明作为一种重要的密码学协议,是实现数据安全流通的关键技术之一.其允许证明者向验证者证明某个断言的正确性,而又不泄露任何额外信息.零知识证明所描述的断言可划分成代数断言、非代数断言和复合断言,而递归与复合技术可以极... 零知识证明作为一种重要的密码学协议,是实现数据安全流通的关键技术之一.其允许证明者向验证者证明某个断言的正确性,而又不泄露任何额外信息.零知识证明所描述的断言可划分成代数断言、非代数断言和复合断言,而递归与复合技术可以极大地提高零知识证明协议的性能并深入拓展其功能,是当前的研究热点.本文系统且全面地研究了零知识证明的递归与复合技术.首先,在针对代数断言的递归零知识证明方面,全面研究了关于内积关系的递归零知识证明协议,并从证明复杂度、通信复杂度、验证复杂度等角度对比分析了基于Pedersen承诺方案的内积论证协议.其次,在针对非代数断言的递归零知识证明方面,全面梳理了增量可验证计算方案与基于电路的证明系统组合这两种主流应用的研究现状,并对比分析了增量可验证计算方案的复杂度、关键技术及实现方案等.然后,在针对复合断言的复合零知识证明方面,从复杂度、启动阶段、关键模块等角度对比分析了承诺并证明的零知识证明协议.最后,给出了零知识证明递归与复合技术的未来研究方向. 展开更多
关键词 零知识证明 递归零知识证明 内积论证 增量可验证计算方案 复合零知识证明 承诺并证明的零知识证明
下载PDF
A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
5
作者 Chen Guo PengWeijun +3 位作者 Wu Jing Fang Youxuan Ye Keke Xin Yanshuang 《China Communications》 SCIE CSCD 2024年第7期267-277,共11页
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosur... With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house leasing.In the traditional housing leasing scenario,problems of door lock information disclosure,tenant privacy disclosure and rental contract disputes frequently occur,and the security,fairness and auditability of the housing leasing transaction cannot be guaranteed.To solve the above problems,a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed.The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding,and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions.Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment.To construct a decentralized housing lease transaction architecture,the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System.Finally,the security proof and computing performance analysis of the proposed scheme are carried out.The results show that the scheme can resist the chosen plaintext attack and has low computational cost. 展开更多
关键词 attribute encryption blockchain homomorphic encryption house leasing proxy re-encryption zero-knowledge proof
下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
6
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts
7
作者 Xiaohui Yang Kun Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1843-1859,共17页
Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of d... Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of data.However,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of data cannot be guaranteed,resulting in low enthusiasm of participants.A fair and trusted medical data trading scheme based on smart contracts is proposed,which aims to encourage participants to be honest and improve their enthusiasm for participation.The scheme uses zero-knowledge range proof for trusted verification,verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,and realizes privacy protection.At the same time,the game pricing strategy selects the best revenue strategy for all parties involved and realizes the fairness and incentive of the transaction price.The smart contract is used to complete the verification and game bargaining process,and the blockchain is used as a distributed ledger to record the medical data transaction process to prevent data tampering and transaction denial.Finally,by deploying smart contracts on the Ethereum test network and conducting experiments and theoretical calculations,it is proved that the transaction scheme achieves trusted verification and fair bargaining while ensuring privacy protection in a decentralized environment.The experimental results show that the model improves the credibility and fairness of medical data transactions,maximizes social benefits,encourages more patients and medical institutions to participate in the circulation of medical data,and more fully taps the potential value of medical data. 展开更多
关键词 Blockchain data transactions zero-knowledge proof game pricing
下载PDF
A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain
8
作者 Yurong Luo Wei You +3 位作者 Chao Shang Xiongpeng Ren Jin Cao Hui Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2237-2260,共24页
The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among th... The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants. 展开更多
关键词 IoT data sharing zero-knowledge proof authentication privacy preserving blockchain
下载PDF
An Effective Security Comparison Protocol in Cloud Computing
9
作者 Yuling Chen Junhong Tao +2 位作者 Tao Li Jiangyuan Cai Xiaojun Ren 《Computers, Materials & Continua》 SCIE EI 2023年第6期5141-5158,共18页
With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses ... With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and calculation.While this can save customers’operating costs,it also poses privacy and security challenges.Such challenges can be solved using secure multi-party computation(SMPC),but this still exposes more security issues.In cloud computing using SMPC,clients need to process their data and submit the processed data to the cloud server,which then performs the calculation and returns the results to each client.Each client and server must be honest.If there is cooperation or dishonest behavior between clients,some clients may profit from it or even disclose the private data of other clients.This paper proposes the SMPC based on a Partially-Homomorphic Encryption(PHE)scheme in which an addition homomorphic encryption algorithm with a lower computational cost is used to ensure data comparability and Zero-Knowledge Proof(ZKP)is used to limit the client’s malicious behavior.In addition,the introduction of Oblivious Transfer(OT)technology also ensures that the semi-honest cloud server knows nothing about private data,so that the cloud server of this scheme can calculate the correct data in the case of malicious participant models and safely return the calculation results to each client.Finally,the security analysis shows that the scheme not only ensures the privacy of participants,but also ensures the fairness of the comparison protocol data. 展开更多
关键词 Secure comparison protocols zero-knowledge proof homomorphic encryption cloud computing
下载PDF
Existence of 3-round zero-knowledge proof systems for NP 被引量:2
10
作者 LI HongDat LI Bao 《Science in China(Series F)》 2008年第3期273-282,共10页
This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new intera... This paper considers the existence of 3-round zero-knowledge proof systems for NP. Whether there exist 3-round non-black-box zero-knowledge proof systems for NP language is an open problem. By introducing a new interactive proof model, we construct a 3-round zero-knowledge proof system for graph 3-coloring under standard assumptions. Our protocol is a non-black-box zero-knowledge proof because we adopt a special strategy to prove the zero-knowledge property. Consequently, our construction shows the existence of 3-round non-black-box zero-knowledge proof for all languages in NP under the DDH assumption. 展开更多
关键词 interactive proof zero-knowledge proof non-black-box simulation DDH assumption
原文传递
Boros-Moll多项式序列递推关系的代数证明
11
作者 窦裕杰 王佳合 +1 位作者 邓晓明 吕仑 《河北科技大学学报》 CAS 北大核心 2023年第4期368-373,共6页
为了拓展Boros-Moll多项式序列递推关系的基本理论,研究了Boros-Moll多项式序列递推关系新的证明方法。首先,对Boros-Moll多项式序列满足的递推关系进行适当变形、分拆;其次,将满足的递推关系式构造为3个部分和的差式;最后,运用代数方... 为了拓展Boros-Moll多项式序列递推关系的基本理论,研究了Boros-Moll多项式序列递推关系新的证明方法。首先,对Boros-Moll多项式序列满足的递推关系进行适当变形、分拆;其次,将满足的递推关系式构造为3个部分和的差式;最后,运用代数方法、构造法等数学方法得出3个部分的和均为零,进一步得到Boros-Moll多项式序列递推关系的一个新的证明方法。结果表明,在Boros-Moll多项式序列递推关系中,对其结构进行巧妙变形、分拆,再证明相应的引理成立,可得出一个新的证明方法。研究结果丰富了Boros-Moll多项式序列递推关系的相关理论,为Boros-Moll多项式序列在组合数学、社会科学、信息论等领域的应用提供了理论参考。 展开更多
关键词 组合数学 Boros-Moll多项式序列 递推关系 代数证明 构造法
下载PDF
Memorizable Interactive Proof and Zero-Knowledge Proof Systems
12
作者 NingChen Jia-WeiRong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期936-941,共6页
Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have... Interactive proof and zero-knowledge proof systems are two important concepts in cryptography and complexity theory. In the past two decades, a great number of interactive proof and zero-knowledge proof protocols have been designed and applied in practice. In this paper, a simple memorizable zero-knowledge protocol is proposed for graph non-isomorphism problem, based on the memorizable interactive proof system, which is extended from the original definition of interactive proof and is more applicable in reality. Keywords interactive proof - zero-knowledge proof - memorizable interactive proof - memorizable zero-knowledge proof This work was supported by the ministry of Science and Technology of China (Grant No.2001CCA03000), and the National Natural Science Foundation of China (Grant No.60273045).Ning Chen received his B.S. degree from Fudan University in 2001. Now he is a master candidate of Department of Computer Science, Fudan University. His research interests include computational complexity, computational cryptography, algorithm design and analysis.Jia-Wei Rong received her B.S. degree from Fudan University in 2002. Now she is a master candidate of Department of Computer Science, Fudan University. Her research interests include computational cryptography, machine learning, artificial intelligence. 展开更多
关键词 interactive proof zero-knowledge proof memorizable interactive proof memorizable zero-knowledge proof
原文传递
BMSC:A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum
13
作者 Yang Li Yinyun Zhang +2 位作者 Mengmeng Wang Jianming Zhu Xiuli Wang 《国际计算机前沿大会会议论文集》 2022年第2期59-77,共19页
Blockchains are widely used because of their openness,transparency,nontampering and decentralization.However,there is a high risk of information leakage when trading on blockchain,and the existing anonymous trading sc... Blockchains are widely used because of their openness,transparency,nontampering and decentralization.However,there is a high risk of information leakage when trading on blockchain,and the existing anonymous trading schemes still have some problems.To meet the high requirement of anonymity,the cost of proof submitted by the user is too large,which does not apply to blockchain storage.Meanwhile,transaction verification takes too long to ensure the legitimacy of the transaction.To solve these problems,this paper presents a novel anonymous trading scheme named Block Maze Smart Contract(BMSC)based on the zeroknowledge proof system zk-SNARKs to propose efficiency.This scheme can hide account balances,transaction amounts,and the transfer relationships between transaction parties while preventing overspending attacks and double-spending attacks.Compared with other anonymous schemes,this scheme has less cost of proof and takes less time for transaction verification while meeting the high requirements of anonymity and security. 展开更多
关键词 zero-knowledge proof Ethereum Account-model Anonymous trading
原文传递
基于类型理论的递旧元程序设计 被引量:1
14
作者 谭庆平 陈火旺 《软件学报》 EI CSCD 北大核心 1994年第8期30-35,共6页
本文提出在LF类型理论中定义一组相互递归类型的方法,并对递归类型赋予操作语义.这样,递归类型不仅可以表示通常的递归数据结构,还可描述一般的递归问题求解、递归证明构造和递归程序构造过程.
关键词 类型理论 递归 程序设计 数据结构
下载PDF
数理逻辑之研究对象、学科归属、定义及研究领域 被引量:6
15
作者 顾红芳 白鹏 +1 位作者 肖奚安 朱梧槚 《自然杂志》 2000年第5期294-299,共6页
鉴于对数理逻辑这一学科的定义、研究对象、研究领域与学科归属等问题,尚无一个一致的说法,有的已不符合历史发展的现状.例如,就学科归属而言,就有两种说法:其一说数理逻辑是数学的一个分支;其二说数理逻辑是逻辑学的一个分支,如此等等... 鉴于对数理逻辑这一学科的定义、研究对象、研究领域与学科归属等问题,尚无一个一致的说法,有的已不符合历史发展的现状.例如,就学科归属而言,就有两种说法:其一说数理逻辑是数学的一个分支;其二说数理逻辑是逻辑学的一个分支,如此等等.有的数理逻辑著作中完全不论及这类问题.为此,本文从数理逻辑历史发展的几个侧面加以分析,并综合各家之长对数理逻辑的定义、研究对象、研究领域与学科归属等问题进行了探讨. 展开更多
关键词 数理逻辑 研究内容 研究对象 学科归属
下载PDF
关于B样条函数系的一个定理 被引量:1
16
作者 姜至本 《中国纺织大学学报》 CSCD 1991年第2期39-42,共4页
本文对于L.L.Schumaker的名著《Spline Functions:Basic Theory》第四章中关于B样条函数系线性无关的定理4.18的证明,指出了其欠妥当之处,提出了反例并给出了正确的证明。
关键词 样条函数 B样条函数 线性无关
下载PDF
π-演算中无卫递归的消除
17
作者 林惠民 《软件学报》 EI CSCD 北大核心 1997年第5期321-326,共6页
本文提出消除π-演算中无卫递归的公理,证明了将该公理加入到正则π-演算受卫递归子集上的证明系统后。
关键词 进程代数 Π-演算 互模拟 证明系统 无卫递归
下载PDF
一个丢番图方程组的初等解法
18
作者 佟瑞洲 王振堂 《辽宁工业大学学报(自然科学版)》 2010年第6期398-399,共2页
1941年,Ljunggren证明了Pell方程组x2-2y2=1 y2-3z2=1仅有正整数解x=3,y=2,z=1.1989年,曹珍富用Baker方法给出上述结果的一个证明。用递推序列法给出一个简洁的初等证明。
关键词 丢番图方程组 递推序列法 初等证明 正整数解
下载PDF
基于齐次线性递归防欺骗的多秘密共享方案
19
作者 张瑜 陆正福 +1 位作者 杨子兰 杜珍珍 《软件导刊》 2012年第6期144-146,共3页
基于齐次线性递归的秘密共享方案,用于解决非法成员对合法成员欺骗的问题,主要是通过引入交互式零知识证明方法防止非法成员对合法成员的欺骗。总结了秘密共享中的欺骗分类。
关键词 线性递归 防欺骗 多秘密共享 零知识证明
下载PDF
地形图地物点点位中误差与间距中误差关系的探讨
20
作者 高俊强 曹礼健 《南京建筑工程学院学报》 2002年第3期23-27,共5页
对地形图地物点点位中误差和间距中误差的关系进行的理论推导和统计假设检验 ,都证明了 m点 =m距 。说明规范中规定 m点 =1.2 5 m距 是欠妥当的。
关键词 地形图 点位中误差 间距中误差 统计检验 回归分析
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部