Confidential matters

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Confidential Assets

Bitcoin is an online distributed ledger in which coins are distributed according to the unspent transaction output (UTXO) set, and transactions describe changes to this set. Every UTXO has associated to it an amount and signature verification key, representing the quantity that can be spent and the entity authorized to do so, respectively. Because the ledger is distributed and publicly verifiab...

متن کامل

Ring Confidential Transactions

This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is cryptocurrency which is distributed through a proof of work “mining” process. The original Monero protocol was based on CryptoNote, which uses Ring Signatures and one-time keys to hide the destination and origin of transactions. Recently the...

متن کامل

Arguing with Confidential Information

While researchers have looked at many aspects of argumentation, an area often neglected is that of argumentation strategies. That is, given multiple possible arguments that an agent can put forth, which should be selected in what circumstances. In this paper, we propose a heuristic that implements one such strategy. The heuristic assigns a utility cost to revealing information, as well as a uti...

متن کامل

Confidential inquiries into maternal deaths.

In 1971 344 700 people sustained non-fatal injuries in road traffic accidents, and of these probably 8% (27 576) were back seat passengers. This figure is unlikely to be less in the subsequent years. Of these 27 576 passengers no fewer than half will have received moderate or severe injuries. Most authorities now accept that there is a dramatic reduction in the severity of injuries, in particul...

متن کامل

Broadcast channels with confidential messages

Absrfucr-Given two discrete memoryless channels @MC’s) with a common input, it is desired to transmit private messagea to receiver 1 at r&R, andcommon meswgea to both receivers at rate R,, while keeping receiver 2 as ignorant of tbe private messages as possible. Measurhg ignorance by equivocation, a single-letter characterization is given of the. achievable trfplea (RI&R,-,) where 4 is the equi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1983

ISSN: 0028-0836,1476-4687

DOI: 10.1038/304478b0