Results 31 to 40 of about 30,718 (224)
Multikey Verifiable Homomorphic Encryption
A homomorphic encryption (HE) scheme is an advanced encryption technology which allows any user receiving ciphertexts to perform computations over them in a public manner. An important application of an HE scheme is a private delegating computation where
Yi Lu, Keisuke Hara, Keisuke Tanaka
doaj +1 more source
Election Verifiability for Helios under Weaker Trust Assumptions [PDF]
Most electronic voting schemes aim at providing verifiability: voters should trust the result without having to rely on some authorities. Actually, even a prominent voting system like Helios cannot fully achieve verifiability since a dishonest bulletin ...
A. Juels +7 more
core +4 more sources
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election
Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance. In this work, we p verifiable,
Xukai Zou +4 more
doaj +1 more source
Verified Bytecode Verifiers [PDF]
Using the theorem prover Isabelle/HOL we have formalized and proved correct an executable bytecode verifier in the style of Kildall's algorithm for a significant subset of the Java Virtual Machine. First an abstract framework for proving correctness of data flow based type inference algorithms for assembly languages is formalized.
openaire +1 more source
The formal verification of programs has progressed tremendously in the last decade. In this talk, I review some of the obstacles that [6, 8, 15, 18] remain to be lifted before source-level verification tools can be taken really seriously in the critical software industry.
openaire +1 more source
Plaintext-Verifiably-Checkable Encryption and Its Extension in Dual-Server Setting
Plaintext-checkable encryption (PCE), first introduced by Canard et al., allows users searching on encrypted data through plaintexts. It provides a useful primitive in the cloud computing security.
Yijian Zhong, Sha Ma, Qiong Huang
doaj +1 more source
Distributed Protocols at the Rescue for Trustworthy Online Voting [PDF]
While online services emerge in all areas of life, the voting procedure in many democracies remains paper-based as the security of current online voting technology is highly disputed. We address the issue of trustworthy online voting protocols and recall
Grumbach, Stéphane, Riemann, Robert
core +4 more sources
VeriFi: Towards Verifiable Federated Unlearning
Federated learning (FL) is a collaborative learning paradigm where participants jointly train a powerful model without sharing their private data. One desirable property for FL is the implementation of the right to be forgotten (RTBF), i.e., a leaving participant has the right to request to delete its private data from the global model.
Xiangshan Gao +7 more
openaire +2 more sources
Metachromatic Butterfly Bile Pigments for Multi‐Level Optical Security Films
Bio‐derived optical security materials are manufactured by embedding butterfly‐based pigments in polymer films. Tunable color and fluorescence responses arise from concentration‐controlled metachromasy, enabling spatially encoded patterns with distinct visible, UV‐active, and spectral signatures.
Limin Wang, Bodo D. Wilts
wiley +1 more source
Modelling of Reliability Indicators of a Mining Plant
The evaluation and prediction of reliability and testability of mining machinery and equipment are crucial, as advancements in mining technology have increased the importance of ensuring the safety of both the technological process and human life.
Boris V. Malozyomov +6 more
doaj +1 more source

