搜索结果: 1-4 共查到“密码学 Consistency”相关记录4条 . 查询时间(0.064 秒)
Write-Optimized Consistency Verification in Cloud Storage with Minimal Trust
Merkle tree hash functions authentication codes
2016/12/7
We propose log-structured ADSs for lightweight verification in cloud outsourcing. Our approach is leveraging recently available commercial TEE (trusted execution environment, such as Intel SGX). For s...
Extended Validity and Consistency in Byzantine Agreement
Extended Validity Consistency Byzantine Agreement
2009/4/14
A broadcast protocol allows a sender to distribute a value among a set of players such that
it is guaranteed that all players receive the same value (consistency), and if the sender is honest,
then ...
Efficient Consistency Proofs for Generalized Queries on a Committed Database
Commitment zero-knowledge sets authenticated data structures
2009/3/27
A consistent query protocol (CQP) allows a database owner to publish a very short string c which
commits her and everybody else to a particular database D, so that any copy of the database can later
...
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Searchable Encryption Consistency Properties Anonymous IBE
2009/2/20
We identify and fill some gaps with regard to consistency (the extent to which false positives
are produced) for public-key encryption with keyword search (PEKS). We define computational
and statist...