Search

Search Results

Showing 1-20 of 118,367 results
  1. Article

    Efficient secure multi-party computation for proof of custody in Ethereum sharding

    Ethereum, one of the most prominent and widely deployed blockchain systems, is undergoing a significant upgrade that adopts sharding for capacity...

    Yuxin Tong, Xiang Xie, ... Rui Xue in Designs, Codes and Cryptography
    27 March 2024
  2. Article
    Full access

    Fast, Verified Computation for HOL ITPs

    We add an efficient function for computation to the kernels of higher-order logic interactive theorem provers. First, we develop and prove sound our...

    Oskar Abrahamsson, Magnus O. Myreen, ... Johannes Åman Pohjola in Journal of Automated Reasoning
    18 February 2025 Open access
  3. Article

    Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs

    In the current landscape of cloud-based data storage and analysis, concerns about data privacy and integrity have become more and more prevalent....

    Joohee Lee, Sangrae Cho, ... Saerom Park in International Journal of Information Security
    26 November 2024
  4. Article

    An efficient quantum non-interactive zero knowledge proof for confidential transaction and quantum range proof

    This paper investigated the Bitcoin blockchain and other crypto currencies confidential transaction techniques for cryptographic commitment in a...

    B. Sriman, S. Ganesh Kumar in Multimedia Tools and Applications
    08 February 2024
  5. Conference paper

    A Quantum-Inspired Mechanical Method for Proving of Ramsey’s Theorem by Symbolic Computation over the Finite Field GF(2)

    This paper presents a quantum-inspired method for proving Ramsey’s theorem using symbolic computation on conventional computers, an improvement of...
    Zhenbing Zeng, Jian Lu, Liangyu Chen in Theoretical Aspects of Computing – ICTAC 2024
    2025
  6. Article

    ECAUT: ECC-infused efficient authentication for internet of things systems based on zero-knowledge proof

    The Internet of Things (IoT) has seen significant growth, enabling connectivity and intelligence in various domains which use RFID communication...

    M. Prakash, K. Ramesh in The Journal of Supercomputing
    13 August 2024
  7. Conference paper

    Fast Integral Bases Computation

    We obtain new complexity bounds for computing a triangular integral basis of a number field or a function field. We reach for function fields a...
    Adrien Poteaux, Martin Weimann in Computer Algebra in Scientific Computing
    2024
  8. Conference paper

    Secure Proof Verification Blockchain Patterns

    In blockchain networks, transaction data is accessible to all participants by design and hence verifiable. This verifiability feature of data stored...
    2024
  9. Article

    A proof system of the CaIT calculus

    The Internet of Things (IoT) can realize the interconnection of people, machines, and things anytime, anywhere. Most of the existing research mainly...

    Ningning Chen, Huibiao Zhu in Frontiers of Computer Science
    11 September 2023
  10. Article
    Full access

    Imperative Process Algebra and Models of Parallel Computation

    Studies of issues related to computability and computational complexity involve the use of a model of computation. Central in such a model are...

    Cornelis A. Middelburg in Theory of Computing Systems
    14 March 2024 Open access
  11. Article
    Full access

    Fast computation of General SimRank on heterogeneous information network

    Similarity computation is a fundamental aspect of information network analysis, underpinning many research tasks including information retrieval,...

    Chuanyan Zhang, Xiaoguang Hong, Yongqing Zheng in Discover Computing
    21 May 2024 Open access
  12. Article
    Full access

    Towards a Scalable Proof Engine: A Performant Prototype Rewriting Primitive for Coq

    We address the challenges of scaling verification efforts to match the increasing complexity and size of systems. We propose a research agenda aimed...

    Jason Gross, Andres Erbsen, ... Adam Chlipala in Journal of Automated Reasoning
    14 August 2024 Open access
  13. Article
    Full access

    Towards a Logical Foundation of Randomized Computation: Doctoral Thesis Abstract

    Interactions between logic and theoretical computer science are multiple and profound. In the last decades, they have been deeply investigated, but,...

    Melissa Antonelli in KI - Künstliche Intelligenz
    16 April 2024 Open access
  14. Article

    SEVCOD: secure and efficient verifiable computation on outsourced data

    Cloud computing has gained significant popularity, as a promising service platform in recent years. It facilitates the users to offload their...

    Partha Sarathi Chakraborty, Omkar Santosh Gavhane, Somanath Tripathy in Cluster Computing
    08 December 2023
  15. Conference paper

    MuxProofs: Succinct Arguments for Machine Computation from Vector Lookups

    Proofs for machine computation prove the correct execution of arbitrary programs that operate over fixed instruction sets (e.g., RISC-V, EVM, Wasm)....
    Zijing Di, Lucas Xia, ... Nirvan Tyagi in Advances in Cryptology – ASIACRYPT 2024
    2025
  16. Conference paper
    Full access

    Proof of Necessary Work: Succinct State Verification with Fairness Guarantees

    Blockchain-based payment systems utilize an append-only log of transactions whose correctness can be verified by any observer. Classically,...
    Assimakis Kattis, Joseph Bonneau in Financial Cryptography and Data Security
  17. Conference paper

    Internet Transparency Through Multi-party Computation

    The inability to check how our Internet traffic is being handled and routed poses all kinds of security and privacy risks. Yet, for the typical...
    Paweł Maćkowiak, Fernando Kuipers in Computer Security. ESORICS 2023 International Workshops
    2024
  18. Article

    EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation

    With the rapid development of cloud computing, clients and users with limited computing resources can outsource their computation-intensive tasks to...

    Chang Xu, Hongzhou Rao, ... Kashif Sharif in Cluster Computing
    15 March 2024
  19. Article
    Full access

    Secure multi-party computation with legally-enforceable fairness

    Fairness is a security notion of secure computation and cannot always be achieved if an adversary corrupts a majority of parties in standard...

    Takeshi Nakai, Kazumasa Shinagawa in International Journal of Information Security
    29 August 2024 Open access
  20. Article
    Full access

    Square root computation in finite fields

    In this paper, we present a review of three widely-used practical square root algorithms. We then describe a unifying framework where each of these...

    Ebru Adiguzel-Goktas, Enver Ozdemir in Designs, Codes and Cryptography
    12 March 2024 Open access
Did you find what you were looking for? Share feedback.