Results 11 to 20 of about 14,519 (193)
Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation
Zero-knowledge proofs have emerged as a powerful tool for enhancing privacy and security in blockchain applications. However, the efficiency and scalability of proof systems remain a significant challenge, particularly in the context of Merkle tree ...
Oleksandr Kuznetsov +5 more
doaj +2 more sources
An improved data integrity validation model for cloud storage [PDF]
Data integrity validation is considered to be an important tool to solve the problem that cloud subscribers cannot accurately know whether there are non-subjective changes in the data they upload to cloud servers.
Qin Zhijian, Huo Lin, Zhang Shicong
doaj +1 more source
Lightweight selective disclosure for verifiable documents on blockchain
To achieve lightweight selective disclosure for protecting privacy of document holders, we propose an XML format for documents that can hide arbitrary elements using a cryptographic hash function and salts, which allows to be partially digitally signed ...
Kenji Saito, Satoki Watanabe
doaj +1 more source
Data Integrity Audit Scheme Based on Quad Merkle Tree and Blockchain
Cloud storage is an essential method for data storage. Verifying the integrity of data in the cloud is critical for the client. Traditional cloud storage approaches rely on third-party auditors (TPAs) to accomplish auditing tasks.
Zhenpeng Liu +4 more
doaj +1 more source
Committing to information is a central task in cryptography, where a party (typically called a prover) stores a piece of information (e.g., a bit string) with the promise of not changing it.
Lijie Chen, Ramis Movassagh
doaj +1 more source
Score-Guided Structural Equation Model Trees
Structural equation model (SEM) trees are data-driven tools for finding variables that predict group differences in SEM parameters. SEM trees build upon the decision tree paradigm by growing tree structures that divide a data set recursively into ...
Manuel Arnold +4 more
doaj +1 more source
Efficient asynchronous accumulators for distributed PKI [PDF]
Cryptographic accumulators are a tool for compact set representation and secure set membership proofs. When an element is added to a set by means of an accumulator, a membership witness is generated. This witness can later be used to prove the membership
Yakoubov, Sophia
core +2 more sources
Efficient verification of parallel matrix multiplication in public cloud: the MapReduce case
With the advent of cloud-based parallel processing techniques, services such as MapReduce have been considered by many businesses and researchers for different applications of big data computation including matrix multiplication, which has drawn much ...
Ramtin Bagheri +2 more
doaj +1 more source
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging [PDF]
The social demand for email end-to-end encryption is barely supported by mainstream service providers. Autocrypt is a new community-driven open specification for e-mail encryption that attempts to respond to this demand.
Chor Benny +13 more
core +2 more sources
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning [PDF]
The secret keys of critical network authorities - such as time, name, certificate, and software update services - represent high-value targets for hackers, criminals, and spy agencies wishing to use these keys secretly to compromise other hosts.
Ford, Bryan +8 more
core +3 more sources

