Auditable Blockchain Randomization Tool

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Highly Auditable Distributed Systems

Auditability is a key requirement for providing scalability and availability to distributed systems. Auditability allows us to identify latent concurrency bugs, dependencies among events, and performance bottlenecks. Our work focuses on providing auditability by combining two key concepts: time and causality. In particular, we prescribe hybrid logical clocks (HLC) which offer the functionality ...

متن کامل

Blind, Auditable Membership Proofs

Auditability is an important property in nancial systems and architectures Here we de ne the primitive of blind auditable mem bership proof BAMP which combines public auditability with privacy i e user anonymity In particular one can use it as an auditable alter native to a blind signature component in unconditionally anonymous payment systems and in other systems requiring anonymity We show th...

متن کامل

Auditable Versioned Data Storage Outsourcing

Auditability is crucial for data outsourcing, facilitating accountability and identifying data loss or corruption incidents in a timely manner, reducing in turn the risks from such losses. In recent years, in synch with the growing trend of outsourcing, a lot of progress has been made in designing probabilistic (for efficiency) provable data possession (PDP) schemes. However, even the recent an...

متن کامل

Auditable Metering with Lightweight Security

In this work we suggest a new mechanism for metering the popularity of web-sites: The compact metering scheme. Our approach does not rely on client authentication or on a third party. Instead, we suggest the notion of a timing function, a computation that can be performed incrementally, whose output is compact, and whose result can be used to eeciently verify the eeort spent with high degree of...

متن کامل

Ciphertext-Auditable Identity-Based Encryption

Ciphertext-auditability of public key encryption scheme means that the ciphertext should been verified by anyone whether it was actually created by the public key. It also should satisfy two additional requirements: 1) no adversary can create a valid-looking ciphertext and then it can pass the verification process together with a public key and a plaintext; 2) the plaintext cannot be revealed f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings

سال: 2019

ISSN: 2504-3900

DOI: 10.3390/proceedings2019033017