Literatura académica sobre el tema "Zk-SNARKs Authentication"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Zk-SNARKs Authentication".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Zk-SNARKs Authentication"

1

Koulianos, Athanasios, Panagiotis Paraskevopoulos, Antonios Litke, and Nikolaos K. Papadakis. "Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof." Sensors 24, no. 17 (2024): 5838. http://dx.doi.org/10.3390/s24175838.

Texto completo
Resumen
UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public blockchains. In this work, we propose a novel approach utilizing zero-knowledge proof techniques, specifically zk-SNARKs, which are non-interactive cryptographic proofs. This approach allows UAVs to prove their authenticity or location without disclosing sensitive information. We genera
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Salleras, Xavier, and Vanesa Daza. "ZPiE: Zero-Knowledge Proofs in Embedded Systems." Mathematics 9, no. 20 (2021): 2569. http://dx.doi.org/10.3390/math9202569.

Texto completo
Resumen
Zero-Knowledge Proofs (ZKPs) are cryptographic primitives allowing a party to prove to another party that the former knows some information while keeping it secret. Such a premise can lead to the development of numerous privacy-preserving protocols in different scenarios, like proving knowledge of some credentials to a server without leaking the identity of the user. Even when the applications of ZKPs were endless, they were not exploited in the wild for a couple of decades due to the fact that computing and verifying proofs was too computationally expensive. However, the advent of efficient s
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Sisodia, Kartik, and Garima Sharma. "Block Chain Based Identify Management for Secure & Decentralised Web Application." Radius: Journal of Science and Technology 2, no. 1 (2025): 251009. https://doi.org/10.5281/zenodo.15366215.

Texto completo
Resumen
The research presents a blockchain-based identity management system for protecting decentralized web applications by operating through decentralized processes. Through its permissioned Ethereum network The-system enables automatic operations for identity lifecycle management to register authenticate authorize and revoke users while maintaining privacy of user data (anonymization and encryption of user data). Users receive hashed credentials which the blockchain ledger retains forever as secure storage alongside complete PII data privacy. Smart contracts determine access through comparison betw
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Xiao, Shangzhuo. "Investigations into a Cross-Domain Authentication Model for Cloud Computing, Utilizing a Dynamically Sharded Masterchain-Sidechain Hybrid Architecture for Enhanced Privacy-Regulatory Equilibrium." Science and Technology of Engineering, Chemistry and Environmental Protection 1, no. 2 (2025). https://doi.org/10.61173/q44fp397.

Texto completo
Resumen
This study proposes a dynamic main-chain-side-chain hybrid architecture to address the privacy leakage risk (68% APT attack probability) and efficiency bottleneck (42% OAuth2.0 failure rate) in conventional cross-domain authentication systems in cloud computing, focusing on resolving the performance-privacy-regulation paradox. The creation of decentralized authentication involves constructing a multi-layered structure: the primary chain layer utilizes PoS consensus and SHA-3 algorithm to manage identity registration delays at 120ms; the secondary layer employs ShardedBFT dynamic slicing techno
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Zk-SNARKs Authentication"

1

Musfique, Md Masum, Tanvir Ahmed Aadeef, Md Samiur Rahman, Monosij Kanti Sarkar, and Md Fahad Monir. "Trust-Centric User Authentication on Neo Blockchain: The Integration of zk-SNARKs Verification." In 2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE, 2023. http://dx.doi.org/10.1109/wetice57085.2023.10477832.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Khor, Jing Huey, Michail Sidorov, Nathan Tze Min Ho, and Tze Hank Chia. "Public Blockchain-based Lightweight Anonymous Authentication Platform Using Zk-SNARKs for Low-power IoT Devices." In 2022 IEEE International Conference on Blockchain (Blockchain). IEEE, 2022. http://dx.doi.org/10.1109/blockchain55522.2022.00058.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!