Read e-book online Advanced in computers. / Volume 94 PDF

By A R Hurson

ISBN-10: 0128001615

ISBN-13: 9780128001615

ISBN-10: 0128003251

ISBN-13: 9780128003251

Since its first quantity in 1960, Advances in Computers has offered certain insurance of thoughts in machine undefined, software program, idea, layout, and functions. It has additionally supplied participants with a medium within which they could discover their topics in larger intensity and breadth than magazine articles frequently enable. accordingly, many articles became usual references that stay of important, lasting price during this speedily increasing field.

  • In-depth surveys and tutorials on new machine technology
  • Well-known authors and researchers within the field
  • Extensive bibliographies with so much chapters
  • Many of the volumes are dedicated to unmarried subject matters or subfields of desktop science

Show description

Read or Download Advanced in computers. / Volume 94 PDF

Best nonfiction_12 books

Additional resources for Advanced in computers. / Volume 94

Sample text

Bt only known to the prover. For 1 ≤ i ≤ t, let zi be an encryption of bi known to the verifier. Let b = B (b1 , b2 , . . , bt ). The prover produces an encryption z for b and convinces the verifier that z encrypts the correct bit without giving the verifier any information on the input bits b1 , b2 , . . , bt nor on the result b. A permuted truth table for the Boolean function B is introduced here, which is a binary string of length (t + 1)2t formed of 2t blocks of t + 1 bits. The last bit of each block is the value of B on the other t bits of the block.

More formally, the prover proves to the verifier using a WI proof knowledge that it knows a witness to the fact that (x, τ ) ∈ L(S ) where S is defined so that (x, τ ) ∈ L(S ) if and only if there exists w such that either (x, w ) ∈ R or (τ , w ) ∈ S. 10 Quality of ZKPs The soundness condition is considered as a “security” property because it protects the verifier from adversarial behavior by the prover [17]. Usually, it has two commonly used versions: • Statistical soundness: If x ∈ / L, then for all, even computationally ∗ unbounded, strategies P , V accepts in (P ∗ , V )(x) with probability at most 1/3.

In this way, the verifier can check if the construction is a legal one with the correct structural information. • With probability 1/2, the verifier chooses to compute, in which case the prover opens only the result of the computation. In order to prove that the output presented is in fact the computed result, the prover opens only parts that are involved in the computation, while other information is left encrypted. The unopened information appears random. The process is repeated r times; each time the verifier either chooses to verify or chooses to compute.

Download PDF sample

Advanced in computers. / Volume 94 by A R Hurson


by Daniel
4.4

Rated 4.15 of 5 – based on 3 votes