Добірка наукової літератури з теми "Zk-SNARKs Authentication"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Zk-SNARKs Authentication".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Zk-SNARKs Authentication"

1

Koulianos, Athanasios, Panagiotis Paraskevopoulos, Antonios Litke, and Nikolaos K. Papadakis. "Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof." Sensors 24, no. 17 (2024): 5838. http://dx.doi.org/10.3390/s24175838.

Повний текст джерела
Анотація:
UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public blockchains. In this work, we propose a novel approach utilizing zero-knowledge proof techniques, specifically zk-SNARKs, which are non-interactive cryptographic proofs. This approach allows UAVs to prove their authenticity or location without disclosing sensitive information. We genera
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Salleras, Xavier, and Vanesa Daza. "ZPiE: Zero-Knowledge Proofs in Embedded Systems." Mathematics 9, no. 20 (2021): 2569. http://dx.doi.org/10.3390/math9202569.

Повний текст джерела
Анотація:
Zero-Knowledge Proofs (ZKPs) are cryptographic primitives allowing a party to prove to another party that the former knows some information while keeping it secret. Such a premise can lead to the development of numerous privacy-preserving protocols in different scenarios, like proving knowledge of some credentials to a server without leaking the identity of the user. Even when the applications of ZKPs were endless, they were not exploited in the wild for a couple of decades due to the fact that computing and verifying proofs was too computationally expensive. However, the advent of efficient s
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sisodia, Kartik, and Garima Sharma. "Block Chain Based Identify Management for Secure & Decentralised Web Application." Radius: Journal of Science and Technology 2, no. 1 (2025): 251009. https://doi.org/10.5281/zenodo.15366215.

Повний текст джерела
Анотація:
The research presents a blockchain-based identity management system for protecting decentralized web applications by operating through decentralized processes. Through its permissioned Ethereum network The-system enables automatic operations for identity lifecycle management to register authenticate authorize and revoke users while maintaining privacy of user data (anonymization and encryption of user data). Users receive hashed credentials which the blockchain ledger retains forever as secure storage alongside complete PII data privacy. Smart contracts determine access through comparison betw
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Xiao, Shangzhuo. "Investigations into a Cross-Domain Authentication Model for Cloud Computing, Utilizing a Dynamically Sharded Masterchain-Sidechain Hybrid Architecture for Enhanced Privacy-Regulatory Equilibrium." Science and Technology of Engineering, Chemistry and Environmental Protection 1, no. 2 (2025). https://doi.org/10.61173/q44fp397.

Повний текст джерела
Анотація:
This study proposes a dynamic main-chain-side-chain hybrid architecture to address the privacy leakage risk (68% APT attack probability) and efficiency bottleneck (42% OAuth2.0 failure rate) in conventional cross-domain authentication systems in cloud computing, focusing on resolving the performance-privacy-regulation paradox. The creation of decentralized authentication involves constructing a multi-layered structure: the primary chain layer utilizes PoS consensus and SHA-3 algorithm to manage identity registration delays at 120ms; the secondary layer employs ShardedBFT dynamic slicing techno
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Zk-SNARKs Authentication"

1

Musfique, Md Masum, Tanvir Ahmed Aadeef, Md Samiur Rahman, Monosij Kanti Sarkar, and Md Fahad Monir. "Trust-Centric User Authentication on Neo Blockchain: The Integration of zk-SNARKs Verification." In 2023 IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). IEEE, 2023. http://dx.doi.org/10.1109/wetice57085.2023.10477832.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Khor, Jing Huey, Michail Sidorov, Nathan Tze Min Ho, and Tze Hank Chia. "Public Blockchain-based Lightweight Anonymous Authentication Platform Using Zk-SNARKs for Low-power IoT Devices." In 2022 IEEE International Conference on Blockchain (Blockchain). IEEE, 2022. http://dx.doi.org/10.1109/blockchain55522.2022.00058.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!