Blockchain full nodes are pivotal for transaction availability,as they store the entire ledger,but verifying their storage integrity faces challenges from malicious remote storage attacks such as Sybil,outsourcing,and...
A threshold signature is a special digital signature in which the N-signer share the private key x and can construct a valid signature for any subset of the included t-signer,but less than t-signer cannot obtain any i...
supported by National Key Research and Development Program of China(Nos.2019QY1402 and 2016YFB0800901)。
Recently,local differential privacy(LDP)has been used as the de facto standard for data sharing and analyzing with high-level privacy guarantees.Existing LDP-based mechanisms mainly focus on learning statistical infor...
supported by Major Program of Guangdong Basic and Applied Research (Grant No. 2019B030302008);National Natural Science Foundation of China (Grant Nos. 61872152, 61872409);Science and Technology Program of Guangzhou (Grant No. 201902010081)。
Functional signatures(FS) enable a master authority to delegate its signing privilege to an assistant. Concretely, the master authority uses its secret key skFto issue a signing key skffor a designated function f ∈ F...
This work was supported by the National Natural Science Foundation of China(U1604156,61602158,61772176);Science and Technology Research Project of Henan Province(172102210045).
In the setting of(t,n)threshold secret sharing,at least t parties can reconstruct the secret,and fewer than t parties learn nothing about the secret.However,to achieve fairness,the existing secret sharing schemes eith...
Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations ...
This study examined the influence that the mere presence of others (i.e., non-interactive) has on the decision-making speed of individuals. The study compared four conditions: a participant executing a given task b...
supported by the National Natural Science Foundation of China(21407032,21667013,51578171);Natural Science Foundation of Guangxi Province(2014GXNSFBA118233);Guilin Scientific Research and Technology Development Program(2016012505)
Since it is unrealistic to do an experimental mixture assessment on every possible combination, mathematical model plays an important role in predicting the mixture toxicity. The present study is devoted to the furthe...
Supported by the National Natural Science Foundation of China(Nos.61301240,61271406)
Extracting the cell objects of red tide algae is the most important step in the construction of an automatic microscopic image recognition system for harmful algal blooms.This paper describes a set of composite method...
Rui Zhang was supported by Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No. XDA06010703).;Hongda Li was supported by National Natural Science Foundation of China (Grant No. 60970139)
Dear editor, In this work, we study the notion of attribute- based non-interactive key-exchange (ABNIKE). As a natural extension of the notions of non-interactive key-exchange (NIKE) [1, 2] and identity-based non-...