期刊文献+
共找到2,500篇文章
< 1 2 125 >
每页显示 20 50 100
VPFL:A verifiable privacy-preserving federated learning scheme for edge computing systems 被引量:1
1
作者 Jiale Zhang Yue Liu +3 位作者 Di Wu Shuai Lou Bing Chen Shui Yu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期981-989,共9页
Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the centra... Federated learning for edge computing is a promising solution in the data booming era,which leverages the computation ability of each edge device to train local models and only shares the model gradients to the central server.However,the frequently transmitted local gradients could also leak the participants’private data.To protect the privacy of local training data,lots of cryptographic-based Privacy-Preserving Federated Learning(PPFL)schemes have been proposed.However,due to the constrained resource nature of mobile devices and complex cryptographic operations,traditional PPFL schemes fail to provide efficient data confidentiality and lightweight integrity verification simultaneously.To tackle this problem,we propose a Verifiable Privacypreserving Federated Learning scheme(VPFL)for edge computing systems to prevent local gradients from leaking over the transmission stage.Firstly,we combine the Distributed Selective Stochastic Gradient Descent(DSSGD)method with Paillier homomorphic cryptosystem to achieve the distributed encryption functionality,so as to reduce the computation cost of the complex cryptosystem.Secondly,we further present an online/offline signature method to realize the lightweight gradients integrity verification,where the offline part can be securely outsourced to the edge server.Comprehensive security analysis demonstrates the proposed VPFL can achieve data confidentiality,authentication,and integrity.At last,we evaluate both communication overhead and computation cost of the proposed VPFL scheme,the experimental results have shown VPFL has low computation costs and communication overheads while maintaining high training accuracy. 展开更多
关键词 Federated learning Edge computing PRIVACY-PRESERVING verifiable aggregation Homomorphic cryptosystem
下载PDF
Verifiable Diversity Ranking Search Over Encrypted Outsourced Data 被引量:2
2
作者 Yuling Liu Hua Peng Jie Wang 《Computers, Materials & Continua》 SCIE EI 2018年第4期37-57,共21页
Data outsourcing has become an important application of cloud computing.Driven by the growing security demands of data outsourcing applications,sensitive data have to be encrypted before outsourcing.Therefore,how to p... Data outsourcing has become an important application of cloud computing.Driven by the growing security demands of data outsourcing applications,sensitive data have to be encrypted before outsourcing.Therefore,how to properly encrypt data in a way that the encrypted and remotely stored data can still be queried has become a challenging issue.Searchable encryption scheme is proposed to allow users to search over encrypted data.However,most searchable encryption schemes do not consider search result diversification,resulting in information redundancy.In this paper,a verifiable diversity ranking search scheme over encrypted outsourced data is proposed while preserving privacy in cloud computing,which also supports search results verification.The goal is that the ranked documents concerning diversification instead of reading relevant documents that only deliver redundant information.Extensive experiments on real-world dataset validate our analysis and show that our proposed solution is effective for the diversification of documents and verification. 展开更多
关键词 Cloud security diversity ranking RELEVANCE searchable encryption verifiable search
下载PDF
A Verifiable Credentials System with Privacy-Preserving Based on Blockchain 被引量:1
3
作者 Zhiji Li 《Journal of Information Security》 2022年第2期43-65,共23页
Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the informatio... Decentralized identity authentication is generally based on blockchain, with the protection of user privacy as the core appeal. But traditional decentralized credential system requires users to show all the information of the entire credential to the verifier, resulting in unnecessary overexposure of personal information. From the perspective of user privacy, this paper proposed a verifiable credential scheme with selective disclosure based on BLS (Bohen- Lynn-Shacham) aggregate signature. Instead of signing the credentials, we sign the claims in the credentials. When the user needs to present the credential to verifier, the user can select a part of but not all claims to be presented. To reduce the number of signatures of claims after selective disclosure, BLS aggregate signature is achieved to aggregate signatures of claims into one signature. In addition, our scheme also supports the aggregation of credentials from different users. As a result, verifier only needs to verify one signature in the credential to achieve the purpose of batch verification of credentials. We analyze the security of our aggregate signature scheme, which can effectively resist aggregate signature forgery attack and credential theft attack. The simulation results show that our selective disclosure scheme based on BLS aggregate signature is acceptable in terms of verification efficiency, and can reduce the storage cost and communication overhead. As a result, our scheme is suitable for blockchain, which is strict on bandwidth and storage overhead. 展开更多
关键词 verifiable Credential Aggregate Signatures Privacy Protection Selective Disclosure Blockchain
下载PDF
Verifiable Identity-Based Encryption with Keyword Search for IoT from Lattice
4
作者 Lin Mei Chungen Xu +2 位作者 Lei Xu Xiaoling Yu Cong Zuo 《Computers, Materials & Continua》 SCIE EI 2021年第8期2299-2314,共16页
Internet of Things(IoT),which provides the solution of connecting things and devices,has increasingly developed as vital tools to realize intelligent life.Generally,source-limited IoT sensors outsource their data to t... Internet of Things(IoT),which provides the solution of connecting things and devices,has increasingly developed as vital tools to realize intelligent life.Generally,source-limited IoT sensors outsource their data to the cloud,which arises the concerns that the transmission of IoT data is happening without appropriate consideration of the profound security challenges involved.Though encryption technology can guarantee the confidentiality of private data,it hinders the usability of data.Searchable encryption(SE)has been proposed to achieve secure data sharing and searching.However,most of existing SE schemes are designed under conventional hardness assumptions and may be vulnerable to the adversary with quantum computers.Moreover,the untrusted cloud server may perform an unfaithful search execution.To address these problems,in this paper,we propose the first verifiable identity-based keyword search(VIBKS)scheme from lattice.In particular,a lattice-based delegation algorithm is adopted to help the data user to verify both the correctness and the integrity of the search results.Besides,in order to reduce the communication overhead,we refer to the identity-based mechanism.We conduct rigorous proof to demonstrate that the proposed VIBKS scheme is ciphertext indistinguishable secure against the semi-honestbut-curious adversary.In addition,we give the detailed computation and communication complexity of our VIBKS and conduct a series of experiments to validate its efficiency performance. 展开更多
关键词 Internet of Things verifiable LATTICE searchable encryption
下载PDF
Analysis and improvement of verifiable blind quantum computation
5
作者 肖敏 张艳南 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第5期130-140,共11页
In blind quantum computation(BQC),a client with weak quantum computation capabilities is allowed to delegate its quantum computation tasks to a server with powerful quantum computation capabilities,and the inputs,algo... In blind quantum computation(BQC),a client with weak quantum computation capabilities is allowed to delegate its quantum computation tasks to a server with powerful quantum computation capabilities,and the inputs,algorithms and outputs of the quantum computation are confidential to the server.Verifiability refers to the ability of the client to verify with a certain probability whether the server has executed the protocol correctly and can be realized by introducing trap qubits into the computation graph state to detect server deception.The existing verifiable universal BQC protocols are analyzed and compared in detail.The XTH protocol(proposed by Xu Q S,Tan X Q,Huang R in 2020),a recent improvement protocol of verifiable universal BQC,uses a sandglass-like graph state to further decrease resource expenditure and enhance verification capability.However,the XTH protocol has two shortcomings:limitations in the coloring scheme and a high probability of accepting an incorrect computation result.In this paper,we present an improved version of the XTH protocol,which revises the limitations of the original coloring scheme and further improves the verification ability.The analysis demonstrates that the resource expenditure is the same as for the XTH protocol,while the probability of accepting the wrong computation result is reduced from the original minimum(0.866)^(d*)to(0.819)^(d^(*)),where d;is the number of repeated executions of the protocol. 展开更多
关键词 verifiable blind quantum computation universal blind quantum computation measurement-based quantum computation
原文传递
End-to-end verifiable electronic voting scheme of blockchain based on random linear block code
6
作者 刘霆 Cui Zhe +1 位作者 Pu Hongquan Peng Xingyi 《High Technology Letters》 EI CAS 2020年第1期25-33,共9页
Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.F... Blockchain is an emerging decentralized technology of electronic voting.The current main consensus protocols are not flexible enough to manage the distributed blockchain nodes to achieve high efficiency of consensus.For practical implementation,the consensus based on random linear block code(RLBC)is proposed and applied to blockchain voting scheme.Along with achieving the record correctness and consistency among all nodes,the consensus method indicates the active and inactive consensus nodes.This ability can assist the management of consensus nodes and restrain the generating of chain forks.To achieve end-to-end verifiability,cast-or-audit and randomized partial checking(RPC)are used in the proposed scheme.The voter can verify the high probability of correctness in ballot encryption and decryption.The experiments illustrate that the efficiency of proposed consensus is suitable for blockchain.The proposed electronic voting scheme is adapted to practical implementation of voting. 展开更多
关键词 RANDOM linear block code(RLBC) ELECTRONIC voting(e-voting) blockchain CONSENSUS END-TO-END verifiable
下载PDF
Blockchain-based verifiable computation with optimized resource allocation
7
作者 杨睿哲 Tian tian +2 位作者 Zhang Zheng Li Meng Zhang Yanhua 《High Technology Letters》 EI CAS 2021年第2期139-145,共7页
Nowadays,the data that users need to calculate and process increases sharply,however,ordinary users usually lack the required capability.Therefore,resorting to outsourcing computation,they can delegate computing tasks... Nowadays,the data that users need to calculate and process increases sharply,however,ordinary users usually lack the required capability.Therefore,resorting to outsourcing computation,they can delegate computing tasks to high-performance nodes over the network to meet their needs.In order to ensure the correctness of outsourcing computations,a verifiable computing scheme based on the blockchain smart contract is proposed,where the primary node and the replica nodes complete the task calculation and verification respectively,and reach a final consensus on the results.Moreover,the computing resources and energy consumption of each node to make the consensus are analyzed,based on which an optimization of resources allocation is proposed to maximize the transaction throughput.The simulation results show the effectiveness of the proposed scheme built on distributed consensus and also the throughput improvement by optimizing. 展开更多
关键词 blockchain verifiable computing practical Byzantine fault tolerance(PBFT)
下载PDF
Verifiable Secret Sharing Scheme Based on the Plane Parametric Curve
8
作者 Bin Li 《Applied Mathematics》 2021年第11期1021-1030,共10页
Verifiable secret sharing is a special kind of secret sharing. In this paper, A secure and efficient threshold secret sharing scheme is proposed by using the plane parametric curve on the basis of the principle of sec... Verifiable secret sharing is a special kind of secret sharing. In this paper, A secure and efficient threshold secret sharing scheme is proposed by using the plane parametric curve on the basis of the principle of secret sharing. And the performance of this threshold scheme is analyzed. The results reveal that the threshold scheme has its own advantage of one-parameter representation for a master key, and it is a perfect ideal secret sharing scheme. It can easily detect cheaters by single operation in the participants so that the probability of valid cheating is less than 1/<em>p</em> (where <em>p</em> is a large prime). 展开更多
关键词 Plane Parameter Curve Threshold Scheme verifiable Secret Sharing Cheater Information Rate Participating Members
下载PDF
Verifiable Privacy-Preserving Neural Network on Encrypted Data
9
作者 Yichuan Liu Chungen Xu +3 位作者 Lei Xu Lin Mei Xing Zhang Cong Zuo 《Journal of Information Hiding and Privacy Protection》 2021年第4期151-164,共14页
The widespread acceptance of machine learning,particularly of neural networks leads to great success in many areas,such as recommender systems,medical predictions,and recognition.It is becoming possible for any indivi... The widespread acceptance of machine learning,particularly of neural networks leads to great success in many areas,such as recommender systems,medical predictions,and recognition.It is becoming possible for any individual with a personal electronic device and Internet access to complete complex machine learning tasks using cloud servers.However,it must be taken into consideration that the data from clients may be exposed to cloud servers.Recent work to preserve data confidentiality has allowed for the outsourcing of services using homomorphic encryption schemes.But these architectures are based on honest but curious cloud servers,which are unable to tell whether cloud servers have completed the computation delegated to the cloud server.This paper proposes a verifiable neural network framework which focuses on solving the problem of data confidentiality and training integrity in machine learning.Specifically,we first leverage homomorphic encryption and extended diagonal packing method to realize a privacy-preserving neural network model efficiently,it enables the user training over encrypted data,thereby protecting the user’s private data.Then,considering the problem that malicious cloud servers are likely to return a wrong result for saving cost,we also integrate a training validation modular Proof-of-Learning,a strategy for verifying the correctness of computations performed during training.Moreover,we introduce practical byzantine fault tolerance to complete the verification progress without a verifiable center.Finally,we conduct a series of experiments to evaluate the performance of the proposed framework,the results show that our construction supports the verifiable training of PPNN based on HE without introducing much computational cost. 展开更多
关键词 Homomorphic encryption verifiable neural network PRIVACY-PRESERVING secure computation
下载PDF
PVF-DA: Privacy-Preserving, Verifiable and FaultTolerant Data Aggregation in MEC
10
作者 Jianhong Zhang Qijia Zhang +1 位作者 Shenglong Ji Wenle Bai 《China Communications》 SCIE CSCD 2020年第8期58-69,共12页
As an emergent-architecture, mobile edge computing shifts cloud service to the edge of networks. It can satisfy several desirable characteristics for Io T systems. To reduce communication pressure from Io T devices, d... As an emergent-architecture, mobile edge computing shifts cloud service to the edge of networks. It can satisfy several desirable characteristics for Io T systems. To reduce communication pressure from Io T devices, data aggregation is a good candidate. However, data processing in MEC may suffer from many challenges, such as unverifiability of aggregated data, privacy-violation and fault-tolerance. To address these challenges, we propose PVF-DA: privacy-preserving, verifiable and fault-tolerant data aggregation in MEC based on aggregator-oblivious encryption and zero-knowledge-proof. The proposed scheme can not only provide privacy protection of the reported data, but also resist the collusion between MEC server and corrupted Io T devices. Furthermore, the proposed scheme has two outstanding features: verifiability and strong fault-tolerance. Verifiability can make Io T device to verify whether the reported sensing data is correctly aggregated. Strong fault-tolerance makes the aggregator to compute an aggregate even if one or several Io Ts fail to report their data. Finally, the detailed security proofs are shown that the proposed scheme can achieve security and privacy-preservation properties in MEC. 展开更多
关键词 MEC data aggregation verifiability PRIVACY-PRESERVING FAULT-TOLERANCE
下载PDF
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes 被引量:4
11
作者 于佳 孔凡玉 李大兴 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期236-241,共6页
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a... A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes. 展开更多
关键词 分配方法 共享技术 网络安全 技术性能
下载PDF
Improvement of publicly verifiable authenticated encryption scheme
12
作者 雷飞宇 陈雯 +1 位作者 马昌社 陈克非 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第1期26-28,共3页
A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of tw... A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of two mechanisms including quadratic residue and composite discrete logarithm is proposed, which can defeat the forgery attacks in Ma and Chen scheme. The new scheme remains good confidentiality, public verifiability and efficiency. 展开更多
关键词 计算机 编密方法 装配工艺 安全管理
下载PDF
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server 被引量:2
13
作者 Shuai Li Longxia Huang +1 位作者 Anmin Fu John Yearwood 《Digital Communications and Networks》 SCIE 2017年第4期236-241,共6页
下载PDF
A Public Verifiable Identity Based Signcryption in the Random Oracle Model
14
作者 陈雯 潘峰 +1 位作者 郭放 雷飞宇 《Journal of Donghua University(English Edition)》 EI CAS 2009年第4期368-373,共6页
Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue a... Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model. 展开更多
关键词 随机预言模型 公开验证 签密方案 二次剩余 椭圆曲线 效率比 安全性 证明
下载PDF
Sector Mitigation Policies and Methods in China:Measurable,Reportable,and Verifiable Mechanisms
15
作者 Alun Gu Fei Teng Yu Wang 《Advances in Climate Change Research》 SCIE 2011年第3期115-123,共9页
为国内系统基于很多条扇区缓解政策,这份报纸表明怎么可测量、可报告、可证实(MRV ) 机制在中国在扇区水平被使用。同时,这些缓解政策和方法以 MRV 途径和他们的缓解效果是多样的。这些人物应该在 MRV 的国际构造作为盒子基础的部分... 为国内系统基于很多条扇区缓解政策,这份报纸表明怎么可测量、可报告、可证实(MRV ) 机制在中国在扇区水平被使用。同时,这些缓解政策和方法以 MRV 途径和他们的缓解效果是多样的。这些人物应该在 MRV 的国际构造作为盒子基础的部分被调整。引证 Gu, A. , F。Teng,和王·伊, 2011:在中国的部门缓解政策和方法:可测量、可报告、可证实的机制。副词。Clim。变化物件, 2 (3 ) , doi:10.3724/SP .J.1248.2011.00115。 展开更多
关键词 中国 机制 测量 缓解作用 基础
下载PDF
Publicly Verifiable Distributed Proxy Blind Signature Scheme
16
作者 MA Chuangui CHENG Rui ZHANG Rurun 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期155-158,共4页
In this present paper, we propose a new proxy blind signature scheme, which is publicly verifiable distributed. The algorithm uses the idea of secret sharing schemes to distribute original signer’s ability and the po... In this present paper, we propose a new proxy blind signature scheme, which is publicly verifiable distributed. The algorithm uses the idea of secret sharing schemes to distribute original signer’s ability and the power of the proxy signer, and ensure the property of publicly verifiable secret sharing schemes. A new concept “verifiable time period” is also introduced to reduce the time cost in the period of verifications and increases the efficiency of our scheme. 展开更多
关键词 代理服务器 数字信号 密码 加密技术 通信保密
下载PDF
ASYNCHRONOUS BYZANTINE AGREEMENT PROTOCOL BASED ON VERIFIABLE SIGNATURE SHARING
17
作者 Ji Dongyao Feng Dengguo 《Journal of Electronics(China)》 2006年第1期64-68,共5页
An ([n/3]-1)-resilient Asynchronous Byzantine Agreement Protocol (ABAP) that combines verifiable signature sharing and random secret sharing is proposed. The protocol works in the asynchronous network environment and ... An ([n/3]-1)-resilient Asynchronous Byzantine Agreement Protocol (ABAP) that combines verifiable signature sharing and random secret sharing is proposed. The protocol works in the asynchronous network environment and produces Byzantine agreement within a fixed expected number of computational rounds. The correctness of the protocol is proved in theory. 展开更多
关键词 Byzantine协议 信号分配 随机分配 异步网络
下载PDF
Information-Theoretic Secure Verifiable Secret Sharing over RSA Modulus
18
作者 QIU Gang WANG Hong +1 位作者 WEI Shimin XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1849-1852,共4页
The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoret... The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoretic verifiable secret sharing over RSA (Rivest,Shamir,Adleman) modulus and give the rigorous security proof. It is shown how to distribute a secret among a group such that any set of k parties get no information about the secret. The presented scheme is generally applied to constructions of secure distributed multiplication and threshold or forward-secure signature protocols. 展开更多
关键词 可检验秘密共享 信息安全 RSA 委托
下载PDF
A Verifiable Multi-Secret Sharing Scheme Based on Hermite Interpolation
19
作者 Tomoko Adachi Chie Okazaki 《Journal of Mathematics and System Science》 2014年第9期587-592,共6页
关键词 埃尔米特插值 多秘密共享 插值格式 拉格朗日插值公式 秘密共享方案 阈值方案 参与者 经销商
下载PDF
Publicly Verifiable Encryption Scheme for RSA
20
作者 JIA Xiao-yun LUO Shou-shan +1 位作者 CHEN Ping YUAN Chao-wei 《通讯和计算机(中英文版)》 2007年第1期23-26,34,共5页
关键词 计算机 安全保护 密码 RSA
下载PDF
上一页 1 2 125 下一页 到第
使用帮助 返回顶部