Showing 1 - 20 results of 60 for search '"multi-party"', query time: 0.07s Refine Results
  1. 1
  2. 2
  3. 3

    Fair multi-party concurrent signature scheme by Qing YE, Yun YANG, Shi-hui ZHENG, Li-wei CHANG, Da XIAO, Yi-xian YANG

    Published 2014-03-01
    Subjects: “…multi-party concurrent signature…”
    Get full text
    Article
  4. 4

    Multi-party controlled quantum communication protocol by Li-wei CHANG, Shi-hui ZHENG, Li-ze GU, Min LEI, Yi-xian YANG

    Published 2015-06-01
    “…In order to satisfy the requirements of long-distance multi-node quantum networks,two multi-party controlledquantum communication protocols are put forward via maximally and partially entangled quantum channels.For the maximally entangled channels,projective measurements are used to realizemulti-party controlled joint remote preparation of an arbitrary four-qubitX-state.For the partially entangled channels,collective unitary operations and optimal positive operator-valued measures are used to realize multi-party controlled joint remote preparation of an arbitrary four-qubitX-state.The theoretical analysis shows that the efficiency of the first scheme can be up to 100% which is suprior to that of others.In addition,the efficiency of the second scheme is effectively improved and the way to be used to construct two kinds of measurement methods can be utilized in the similar protocols.…”
    Get full text
    Article
  5. 5
  6. 6

    Multi-party summation query method based on differential privacy by Xianmang HE

    Published 2020-06-01
    Subjects: “…multi-party summation…”
    Get full text
    Article
  7. 7

    Multi-parties key agreement protocol based on elliptic curve by Long GAO, Chun-ming TANG, Yong-qiang ZHANG

    Published 2016-05-01
    Subjects: “…multi-parties key agreement protocol…”
    Get full text
    Article
  8. 8
  9. 9

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…This work focused on the needs of multi-party privacy computing for cross-system exchanges in ubiquitous sharing environments, taking the security sharing and controlled dissemination of private data in multi-party data fusion applications as the starting point, and provided reviews of existing relevant work from the perspectives of multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative secure computing. …”
    Get full text
    Article
  10. 10

    Multi-party efficient audit mechanism for data integrity based on blockchain by Jiashun ZHOU, Na WANG, Xuehui DU

    Published 2021-12-01
    “…A blockchain-based data integrity multi-party high-efficiency audit mechanism (MBE-ADI) for the big data environment was proposed.A hybrid Merkle DAG structure based on data domain was built to organize data, and realized the simultaneous verification of a large number of unstructured data in the big data environment.In order to deal with the problem of large amount of data in the big data environment, a multi copy deterministic verification method based on BLS signature was designed to realize the efficient verification of data integrity supporting multiple copies.A dual verification audit architecture based on consortium blockchain was designed to realize decentralized automatic audit and audit history credible traceability.At the same time, data integrity verification services were provided for data owners and data users to realize reliable acquisition of data.The test proves the feasibility of the system and the efficiency of data integrity audit.…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Solution of secure multi-party multi-data raking problem based on El Gamal encryption by LIU Wen1, LUO Shou-shan2, CHEN Ping4

    Published 2007-01-01
    Subjects: “…secure multi-party multi-data rank…”
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20