J Groth, A Sahai - Advances in Cryptology–EUROCRYPT 2008: 27th …, 2008 - Springer
Non-interactive zero-knowledge proofs and non-interactive witness-indistinguishable proofs have played a significant role in the theory of cryptography. However, lack of efficiency has …
Y Dodis, A Yampolskiy - International Workshop on Public Key …, 2005 - Springer
We give a simple and efficient construction of a verifiable random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [14, 15], it avoids …
A Studer, E Shi, F Bai, A Perrig - … on Sensor, Mesh and Ad Hoc …, 2009 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) require a mechanism to help authenticate messages, identify valid vehicles, and remove malevolent vehicles. A public key infrastructure (PKI) can …
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the authoritative reference on RFID and WSNs. Covering a broad range of topics that includes …
J Groth, A Sahai - SIAM Journal on Computing, 2012 - SIAM
Noninteractive zero-knowledge proofs and noninteractive witness-indistinguishable proofs have played a significant role in the theory of cryptography. However, lack of efficiency has …
Y Zhuge, H Garcia-Molina… - … Conference on Parallel …, 1996 - ieeexplore.ieee.org
A warehouse is a data repository containing integrated information for efficient querying and analysis. Maintaining the consistency of warehouse data is challenging, especially if the …
M Petkus - arXiv preprint arXiv:1906.07221, 2019 - arxiv.org
Despite the existence of multiple great resources on zk-SNARK construction, from original papers to explainers, due to the sheer number of moving parts the subject remains a black …
TK Mandt, CH Tan - Advances in Computer Science-ASIAN 2006. Secure …, 2007 - Springer
In their seminal paper on certificateless public key cryptography, Al-Riyami and Paterson (AP) proposed a certificateless authenticated key agreement protocol. Key agreement …
M Zhao, SW Smith, DM Nicol - Proceedings of the 12th ACM conference …, 2005 - dl.acm.org
The Border Gateway Protocol (BGP) controls inter-domain routing in the Internet. BGP is vulnerable to many attacks, since routers rely on hearsay information from neighbors …