相关期刊:《Progress in Natural Science:Materials International》《Journal of Computer Science & Technology》《Digital Communications and Networks》《Financial Innovation》更多>>
This work is supported by the Major Program of Guangdong Basic and Applied Research(2019B030302008);National Natural Science Foundation of China(61872152);Science and Technology Program of Guangzhou(201902010081)。
A forward-secure group signature(FSGS)ensures the unforgeability of signatures in the past time period despite signing secret key is leaked in the current time period.As we know,traditional FSGS schemes are mostly rel...
supported by Major Science and Technology Project of Henan Province (project number 20130021030).
In the current process of university scientific research funding audits,the auditors do not obtain audit evidence in a timely manner,resulting in a lag in audit time;at the same time,there is the possibility that the ...
This work is supported by the National Natural Science Foundation of China(61872229,U19B2021);the Shaanxi Provincial Science Fund for Distinguished Young Scholars(2022JC-47);the Blockchain Core Technology Strategic Research Program of Ministry of Education of China(2020KJ010301);the Key Research and Development Program of Shaanxi(2021ZDLGY06-04,2020ZDLGY09-06).
The cloud computing technology has emerged,developed,and matured in recent years,consequently commercializing remote outsourcing storage services.An increasing number of companies and individuals have chosen the cloud...
supported by the National Cryptography Development Fund(Grant No.MMJJ20180110);National Natural Science Foundation of China(Grant No.61960206014)。
Group encryption(GE),the encryption analog of group signatures,is a fundamental primitive that offers a privacy-preserving service for a specific receiver concealed within a group of certified users.Like other cryptog...
We received funding solely from our institution to perform this research.
A zero-knowledge proof or protocol is a cryptographic technique for verifying private data without revealing it in its clear form.In this paper,we evaluate the potential for zero-knowledge distributed ledger technolog...
supported by National Natural Science Foundation of China(61672499,61772502);Key Special Project of Beijing Municipal Science&Technology Commission(Z181100003218018);Natural Science Foundation of Inner Mongolia,Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications,SKLNST-2016-2-09);SV-ICT Blockchain&DAPP Joint Lab
The blockchain technology has been applied to wide areas.However,the open and transparent properties of the blockchains pose serious challenges to users’privacy.Among all the schemes for the privacy protection,the ze...
supported in part by National Natural Science Foundation of China (Grant No. 61772521);Key Research Program of Frontier Sciences, Chinese Academy of Sciences (Grant No. QYZDB-SSW-SYS035);Open Project Program of the State Key Laboratory of Cryptology
Canetti, Lin and Paneth in TCC 2013 showed a O(log^(1+ε)n) rounds public-coin concurrent zeroknowledge argument system(CZK) based on the existence of collision resistant hash functions, which is currently known as ro...
supported in part by the National Natural Science Foun-dation of China(Grant No.61772521);Key Research Program of Frontier Sciences,CAS(QYZDB-SSW-SYS035);the Open Project Program of the State Key Laboratory of Cryptology。
Concurrent non-malleable zero-knowledge(CNMZK)considers the concurrent execution of zero-knowledge protocols in a setting even when adversaries can simultaneously corrupt multiple provers and verifiers.As far as we kn...
supported by National Natural Science Foundation of China (Grant No.10871222);National Science Foundation (USA) (Grant No.DMS-0302549);Opening Foundation of Key Lab of Cryptological Technology and Information Security of Ministry of Education in Shandong University
In a traditional (t,n)-threshold secret sharing scheme,t or more honest participants can reconstruct the secret K.In the reconstruction process,the individual shares and the secret key K are revealed,hence K is shar...
With the increase of group communica- tion applications in the Internet, how to provide a secure communication has become an important research issue for network security. In this paper, a distributed group key manage...