Showing 41 - 55 results of 55 for search '"bit commitment"', query time: 1.28s Refine Results
  1. 41
    by Bojun Wang, Cheng Cai, Quan Zhou
    Published 2014-01-01
    ... to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper...
    Get full text
    Article
  2. 42
    by Ding Hangchao, Han Jiang, Qiuliang Xu
    Published 2020-01-01
    ... and Hu by adding three tools, which are XOR, Bit Commitment and Smooth Projective Hash Function (SPHF...
    Get full text
    Article
  3. 43
    by Chang,Tyng-Kwei, 張庭魁
    Published 2005
    ... to use quantum bit commitment mechanism to prevent the storage attack. This thesis also proposes 1-out...
    Get full text
    Others
  4. 44
    by Chia-Fu Yang, 楊家福
    Published 2007
    ... is established on the technique of Symmetric Encryption, Hash function, Triple Signature, Digital Envelope, Bit...
    Get full text
    Others
  5. 45
    by Zihao Shao, Huiqiang Wang, Yifan Zou, Zihan Gao, Hongwu Lv
    Published 2021-01-01
    ...-anonymity algorithm, we propose a Coordinate Transformation and Bit Commitment (CTBC) privacy-preserving...
    Get full text
    Article
  6. 46
    by Bingren Chen, Lide Xue, Wei Yang, Liusheng Huang
    Published 2019-01-01
    ... from SQPQ to quantum bit commitment (QBC) to clarify that SQPQ is a problem more difficult than QBC....
    Get full text
    Article
  7. 47
    by 游菀瑄
    Published 2004
    ... function, bit commitment, generating key pairs, signing and verifying of RSA cryptosystem and so on), we...
    Get full text
    Others
  8. 48
    by Dang, Minh-Dung
    Published 2008
    ... deux parties dont Oblivious Transfer (OT) et Bit Commitment (BC) sont les primitifs fondamentaux. D'une...
    Get full text
    Get full text
  9. 49
    by Jue-Sam Chou, 周志賢
    Published 2002
    ... and a bit commitment scheme, both are used along with the RSA cryptosystem to implement the mental poker...
    Get full text
    Others
  10. 50
    Published 2002
    ... Functions --- p.7 === Chapter 2.4 --- Bit commitment --- p.7 === Chapter 3. --- Brief introduction to Our...
    Get full text
    Get full text
    Others
  11. 51
    Published 2000
    ... --- p.7 === Chapter 2.1 --- One-way Hash Functions --- p.7 === Chapter 2.2 --- The Bit Commitment...
    Get full text
    Get full text
    Others
  12. 52
  13. 53
    by Nguyen, Anh Tuan
    Published 2008
    ...>impossible tasks like bit commitment, quantum computation, random<p>number generation, In this work we were...
    Get full text
    Doctoral Thesis
  14. 54
    by Déchène, Isabelle.
    Published 2005
    ... verifiable secret sharings, hash functions and bit commitments. The search for new groups with intractable...
    Get full text
    Others
  15. 55
    by Ranellucci, Samuel
    Published 2015
    ... no constant rate protocol for bit commitments. We then demonstrate that by restricting the way...
    Get full text