supported in part by National Natural Science Foundation of China (Grant No. 61772521);Key Research Program of Frontier Sciences, Chinese Academy of Sciences (Grant No. QYZDB-SSW-SYS035);Open Project Program of the State Key Laboratory of Cryptology
Canetti, Lin and Paneth in TCC 2013 showed a O(log^(1+ε)n) rounds public-coin concurrent zeroknowledge argument system(CZK) based on the existence of collision resistant hash functions, which is currently known as ro...
supported by Electronics and Telecommunications Research Institute(ETRI)grant funded by the Korean government(17ZH1700,Development of Storage and Search Technologies over Encrypted Database)
In storage service, data de-duplication is a specialized technique for eliminating duplicate copies of repeating data in storage. Especially, client-side de-duplication has more merits than server-side de- duplication...
supported by National Natural Science Foundation of China (Grants Nos. 61672504, 60721061, 60833001, 61572478, 61672503, 61100069, 61161130530);National Basic Research Program of China (973 Program) (Grant No. 2014CB340700)
Many recent implementations of concurrent data structures relaxed their linearizability requirements for better performance and scalability. Quasi-linearizability, k-linearizability and regular-relaxed linearizability...
supported by National High Technology Research and Development Program of China(863 Program)(Grant No.2015AA015303)
Modern graph processing is widely used for solving a vast variety of real-world problems,e.g.,web sites ranking[1]and community detection[2].To better adapt and express the procedure of graph iteration,a wide spectrum...
partially supported by Equipment Pre-Research Foundation of China(Grant No.9140A08010414JW03025)
Realizing barrier synchronization in multi-/many-core processors with high efficiency becomes more and more challenging as the number of cores integrated in a single chip keeps growing. Quite a few barrier solutions h...
funded by National Basic Research Program of China (973 Program) (Grant No.2009CB320702);National High-tech R&D Program (863 Program) (Grant No. 2012AA011205);National Natural Science Foundation of China (Grant Nos. 61100038,61021062);Research Grants Council (612210) of HongKong;Chang Xu was also partially supported by Program for New Century Excellent Talents in University,China (Grant No. NCET-10-0486)
Internetware applications are emerging and being widely used. They can adapt their behavior based on environmental contexts and deliver smart services. These contexts can be subject to various noises, which cause them...
supported by National Natural Science Foundation of China (Grant Nos. 90818027,91018005,60903026,61003020)
With the keyword synchronized, Java provides a simple but often over-used synchronization mech- anism. Many programmers tend to use a big synchronized section to protect a large block of statements even if many of the...
supported by the National Natural Science Foundation of China (Grant Nos.90818019,60573017);the National High-Tech Research and Development Plan of China (Grant No.2008AA01Z102)
Concurrent programs written in a machine-level language are being used in many areas, but the verification of such programs brings various new challenges to the programming language community. Most of existing contrib...
supported by the Specialized Research Fund for the Doctoral Program of Higher Education(GrantNo.200802480019)
Precise concurrent zero-knowledge is a new notion introduced by Pandey et al. in Eurocrypt'08. This notion captures the idea that the view of any verifier in concurrent interaction can be reconstructed in almost the s...