원문정보
보안공학연구지원센터(IJMUE)
International Journal of Multimedia and Ubiquitous Engineering
Vol.9 No.2
2014.02
pp.141-152
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Related Work
3. Preliminaries
3.1. Bilinear Maps
3.2. Strong RSA Assumption
3.3. CL Signatures
3.4. DY Pseudorandom Function
3.5. Pedersen commitment
3.6. Non-Interactive zero- Knowledge Proof
4. Protocol Description
4.1. Protocol Overview
4.2. Protocol outline
5. Security Analysis
5.1. Security Analysis
5.2. Sybil-Proof property
5.3. Malicious TVM peers
6. Efficiency Analysis
7. Conclusion
Acknowledgements
References
1. Introduction
2. Related Work
3. Preliminaries
3.1. Bilinear Maps
3.2. Strong RSA Assumption
3.3. CL Signatures
3.4. DY Pseudorandom Function
3.5. Pedersen commitment
3.6. Non-Interactive zero- Knowledge Proof
4. Protocol Description
4.1. Protocol Overview
4.2. Protocol outline
5. Security Analysis
5.1. Security Analysis
5.2. Sybil-Proof property
5.3. Malicious TVM peers
6. Efficiency Analysis
7. Conclusion
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보