Browsing by Subject "Cryptography"
Now showing items 1-7 of 7
-
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
(Springer-Verlag, 2016) -
BMCProtector: A Blockchain and Smart Contract Based Application for Music Copyright Protection
(2018)n this paper, we explore the design and construct a prototype implementation of an Ethereum application, BMCProtector, which is based on Blockchain and Smart Contract technology, to protect music copyright and ensure rights ... -
Demystifying the Role of zk-SNARKs in Zcash
(2020)Zero-knowledge proofs have always provided a clear solution when it comes to conveying information from a prover to a verifier or vice versa without revealing essential information about the process. Advancements ... -
The Future of E-Voting
(2017)Voting systems have been around for hundreds of years and despite different views on their integrity, have always been deemed secure with some fundamental security and anonymity principles. Numerous electronic ... -
Internet Voting Using Zcash
(2017)Voting systems have been around for hundreds of years and despite different views on their integrity, have always been deemed secure systems with some fundamental security and anonymity principles. Numerous ... -
Solving the Starry Symbols of Sargon II
(2024)The city of Khorsabad (ancient Dūr-Šarrukīn), the newly built capital of Sargon II of Assyria, contained multiple instances of a sequence of five images or symbols (lion, bird, bull, tree, plow) which also appeared shortened ... -
X509Cloud - Framework for a Ubiquitous PKI
(2017)The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual ...