Results 1 to 10 of about 192,432 (282)

Verifiable Delay Function and Its Blockchain-Related Application: A Survey

open access: yesSensors, 2022
The concept of verifiable delay functions has received attention from researchers since it was first proposed in 2018. The applications of verifiable delay are also widespread in blockchain research, such as: computational timestamping, public random ...
Qiang Wu, Shan Ji, Shenqing Wang
exaly   +3 more sources

Privacy-preserving and verifiable spectral graph analysis in the cloud [PDF]

open access: yesScientific Reports
Resorting to cloud computing for spectral graph analysis on large-scale graph data is becoming increasingly popular. However, given the intrusive and opaque natures of cloud services, privacy, and misbehaving cloud that returns incorrect results have ...
Yuzhao Song
doaj   +2 more sources

Visual secret sharing and related Works -A Review [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used
Nahidah Darweesh, Ali Sagheer
doaj   +1 more source

VR-PEKS: A Verifiable and Resistant to Keyword Guess Attack Public Key Encryption with Keyword Search Scheme

open access: yesApplied Sciences, 2023
Public key encryption with keyword search (PEKS) allows users to perform keyword searches of ciphertext on untrusted cloud storage servers, protecting data privacy while sharing data. However, it faces several security problems in practical applications.
Yingying Tang   +4 more
doaj   +1 more source

Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment

open access: yesCryptography, 2023
While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension ...
Buzhen He, Tao Feng
doaj   +1 more source

Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains

open access: yesEntropy, 2023
Machine learning has become increasingly popular in academic and industrial communities and has been widely implemented in various online applications due to its powerful ability to analyze and use data.
Moxuan Fu   +5 more
doaj   +1 more source

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme

open access: yesIEEE Access, 2020
General secret sharing schemes comprise a secret dealer and a number of participants. The dealer can randomly generate a secret and then distribute shares of the secret to the participants.
Na Wang   +3 more
doaj   +1 more source

Protecting Function Privacy and Input Privacy in the Publicly Verifiable Outsourcing Computation of Polynomial Functions

open access: yesFuture Internet, 2023
With the prevalence of cloud computing, the outsourcing of computation has gained significant attention. Clients with limited computing power often outsource complex computing tasks to the cloud to save on computing resources and costs.
Beibei Song   +5 more
doaj   +1 more source

Verifiable Network-Performance Measurements [PDF]

open access: yes, 2010
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: when a domain violates its Service Level Agreement (SLA) with a contractual partner, the partner must resort to ad-hoc probing-based monitoring ...
Argyraki, Katerina   +2 more
core   +9 more sources

Verifiable Computing Applications in Blockchain

open access: yesIEEE Access, 2021
From weak clients outsourcing computational tasks to more powerful machines, to distributed blockchain nodes needing to agree on the state of the ledger in the presence of adversarial nodes, there is a growing need to efficiently verify the results of ...
Silvio Simunic   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy