-
1
-
2
Deniable authentication for multi-party protocol
Published 2016-06-01Subjects: Get full text
Article -
3
Fair multi-party concurrent signature scheme
Published 2014-03-01Subjects: “…multi-party concurrent signature…”
Get full text
Article -
4
Multi-party controlled quantum communication protocol
Published 2015-06-01“…In order to satisfy the requirements of long-distance multi-node quantum networks,two multi-party controlledquantum communication protocols are put forward via maximally and partially entangled quantum channels.For the maximally entangled channels,projective measurements are used to realizemulti-party controlled joint remote preparation of an arbitrary four-qubitX-state.For the partially entangled channels,collective unitary operations and optimal positive operator-valued measures are used to realize multi-party controlled joint remote preparation of an arbitrary four-qubitX-state.The theoretical analysis shows that the efficiency of the first scheme can be up to 100% which is suprior to that of others.In addition,the efficiency of the second scheme is effectively improved and the way to be used to construct two kinds of measurement methods can be utilized in the similar protocols.…”
Get full text
Article -
5
Shared-Custodial Wallet for Multi-Party Crypto-Asset Management
Published 2024-12-01Subjects: Get full text
Article -
6
Multi-party summation query method based on differential privacy
Published 2020-06-01Subjects: “…multi-party summation…”
Get full text
Article -
7
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01Subjects: “…multi-parties key agreement protocol…”
Get full text
Article -
8
Research on security multi-party computing based on game theory
Published 2018-01-01Subjects: Get full text
Article -
9
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…This work focused on the needs of multi-party privacy computing for cross-system exchanges in ubiquitous sharing environments, taking the security sharing and controlled dissemination of private data in multi-party data fusion applications as the starting point, and provided reviews of existing relevant work from the perspectives of multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative secure computing. …”
Get full text
Article -
10
Multi-party efficient audit mechanism for data integrity based on blockchain
Published 2021-12-01“…A blockchain-based data integrity multi-party high-efficiency audit mechanism (MBE-ADI) for the big data environment was proposed.A hybrid Merkle DAG structure based on data domain was built to organize data, and realized the simultaneous verification of a large number of unstructured data in the big data environment.In order to deal with the problem of large amount of data in the big data environment, a multi copy deterministic verification method based on BLS signature was designed to realize the efficient verification of data integrity supporting multiple copies.A dual verification audit architecture based on consortium blockchain was designed to realize decentralized automatic audit and audit history credible traceability.At the same time, data integrity verification services were provided for data owners and data users to realize reliable acquisition of data.The test proves the feasibility of the system and the efficiency of data integrity audit.…”
Get full text
Article -
11
Research on multi-party security collaborative linear regression for computing power networks
Published 2024-08-01Get full text
Article -
12
A improved group quantum key distribution protocol with multi-party collaboration
Published 2025-01-01Get full text
Article -
13
Modeling and analysis of multi-party non-repudiation protocols with extended-CSP approach
Published 2012-11-01Subjects: Get full text
Article -
14
Data Visualization Model for Multi-party Analysis and Strategic Decision-Making in International Trade
Published 2025-01-01Subjects: Get full text
Article -
15
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
Published 2007-01-01Subjects: “…secure multi-party multi-data rank…”
Get full text
Article -
16
Social Discontent and Voting Behaviour in South Africa’s 2024 General Elections: The Transition from One-party Dominance to a Multi-party Coalition
Published 2024-10-01Subjects: “…multi-party coalition government…”
Get full text
Article -
17
Blockchain based trusted traceability system scheme for raw milk supply chain
Published 2021-05-01Subjects: Get full text
Article -
18
Survey on privacy protection in non-aggregated data sharing
Published 2021-06-01Subjects: Get full text
Article -
19
New secure distributed secret sharing scheme of n product
Published 2014-11-01Subjects: Get full text
Article -
20
Research on the privacy-preserving point-in-polygon protocol
Published 2016-04-01Subjects: Get full text
Article