Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
zero knowledge proof
biblio
Identity Authentication Based on Domestic Commercial Cryptography with Blockchain in the Heterogeneous Alliance Network
Submitted by aekwall on Tue, 04/19/2022 - 10:17am
Cryptography
blockchain
authentication
encryption
Resiliency
composability
standards
component
Cryptographic Protocols
pubcrawl
Domestic commercial cryptography
Heterogeneous alliance network
identity authentication
zero knowledge proof
Cross Layer Security
biblio
Secure Authentication using Zero Knowledge Proof
Submitted by grigby1 on Wed, 03/09/2022 - 12:39pm
privacy
Zero Knowledge Proof (ZKP)
zero knowledge proof
SRP
Technological innovation
Multi-factor authentication
multifactor authentication
Metrics
Data Security
Cryptography
authentication
AES
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
encryption
biblio
Anonymity Analysis of Bitcoin, Zcash and Ethereum
Submitted by grigby1 on Wed, 02/09/2022 - 1:47pm
zero knowledge proof
standards
smart contracts
Resiliency
resilience
pubcrawl
network analysis
Metrics
Memory
Internet of Things
Human behavior
composability
blockchain
bitcoin
anonymity
biblio
Traceability in Permissioned Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 10:41am
Scalability
encryption
Resiliency
pubcrawl
bitcoin
blockchain
cryptocurrencies
blockchain security
fully homomorphic encryption
Traceability
Hidden Markov models
zero knowledge proof
permissioned blockchain
hidden Markov model
permissionless blockchain
biblio
Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
pervasive computing devices
user anonymity
user privacy
encoding
cloud-based servers
configurable anonymous authentication schemes
device-user authentication parameters
IoT authentication
IoT testbed
power consumption
privacy-preserving authentication schemes
smart home occupancy
VCSE-based approach
verifiable common secret encoding
zero knowledge proof
ZKP-based approach
zero trust
computer network security
Human Factors
IoT infrastructure
radiofrequency identification
anonymity
authentication
Cryptography
privacy
policy-based governance
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
Scalability
biblio
Zero Knowledge Authentication for Reuse of IPs in Reconfigurable Platforms
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
field programmable gate arrays
Scalability
Hardware
Resiliency
pubcrawl
policy-based governance
Watermarking
authentication
delays
Human Factors
zero knowledge proof
field programmable gate array
intellectual property
zero trust
biblio
Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network
Submitted by aekwall on Mon, 01/20/2020 - 11:12am
trustless network
Hash functions
initial trust setup phase
interactive zero knowledge proof
post quantum attacks
PoW
secure digital service payments
SHA3-finalists
tokenized assets
trusted third party
financial transactions
TTP
Witness Indistinguishability
Zcash
zero knowledge proof
zero knowledge proof method
ZKSNARK
ZKSTARK
zero trust
cryptocurrencies
Scalability
data confidentiality
Cryptographic Protocols
Resiliency
pubcrawl
policy-based governance
bitcoin
blockchain
security of data
smart contracts
multiparty computation
Proof-of-work
distributed network
Human Factors
blockchain ecosystem
enterprise applications
fair exchange
biblio
An Efficient CPA-Secure Encryption Scheme with Equality Test
Submitted by grigby1 on Fri, 09/28/2018 - 3:20pm
multiplicative homomorphism
zero knowledge proof
Resiliency
resilience
public key solutions
public key cryptography
Public key
pubcrawl
Protocols
Probabilistic logic
OW-CPA security
outsourcing
noninteractive zero knowledge proof of discrete log
comparable ciphertext
message encryption
IND-CPA security
Homomorphic encryption
equality test token
encryption scheme with equality test
encryption
ElGamal encryption
efficient encryption
efficient CPA-secure encryption scheme
data outsourcing scenario
cyber physical systems
composability
biblio
Refining Identification Scheme Based on Isomorphism of Polynomials with Two Secrets: A New Theoretical and Practical Analysis
Submitted by grigby1 on Mon, 05/22/2017 - 12:55pm
composability
identification scheme
isomorphism of polynomials
Metrics
multivariate cryptography
pubcrawl
quantum computing security
Resiliency
theoretical cryptography
zero knowledge proof