搜索结果: 1-10 共查到“accumulator”相关记录10条 . 查询时间(0.343 秒)
Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set
accumulators bitcoin merkle proofs
2019/6/4
In the Bitcoin consensus network, all nodes come to agreement on the set of Unspent Transaction Outputs (The “UTXO” set). The size of this shared state is a scalability constraint for the network, as ...
Large FHE gates from Tensored Homomorphic Accumulator
Fully Homomorphic Encryption Large Gates Threshold Gates
2017/10/12
The main bottleneck of all known Fully Homomorphic Encryption schemes lies in the bootstrapping procedure invented by Gentry (STOC'09). The cost of this procedure can be mitigated either using Homomor...
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero
Cryptographic Currency Anonymity
2017/9/25
In this work, we initially study the necessary properties and security requirements of Ring Confidential Transaction (RingCT) protocol deployed in the popular anonymous cryptocurrency Monero. Firstly,...
An accumulator is a succinct aggregate of a set of values where it is possible to issue short
membership proofs for each accumulated value. A party in possession of such a membership
proof can then ...
A CMOS 32-bit Wallace Tree Multiplier-Accumulator
CMOS Wallace Tree Multiplier-Accumulator
2015/8/14
IN SPITE OF THEIR SPEED ADVANTAGE, carry save adder trees (CSA or Wallace trees’ ) are seldom, if ever, used in the design of monolithic multipliers. The main reason is the general belief that they ar...
Using time-varying evidence to test models of decision dynamics:bounded diffusion vs.the leaky competing accumulator model
bounded diffusion LCA perceptual choice non-stationary evidence order effects
2015/6/23
When people make decisions, do they give equal weight to evidence arriving at different times? A recent study (Kiani et al., 2008) using brief motion pulses (superimposed on a random moving dot displa...
The time course of perceptual choice:The leaky competing accumulator model
perceptual choice leaky competing accumulator model
2015/6/19
The time course of perceptual choice:The leaky competing accumulator model.
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
dynamic accumulators anonymous credentials revocation
2009/6/11
The success of electronic authentication systems, be it e-
ID card systems or Internet authentication systems such as CardSpace,
highly depends on the provided level of user-privacy. Thereby, an imp...
Analysis of Bilinear Pairing-based Accumulator for Identity Escrowing
Bilinear Pairing Collision Resistance Cryptographic Accumulators Identity Escrow Group Signature
2012/12/3
An accumulator based on bilinear pairings was proposed at CT-RSA’05. In this paper, we first demonstrate that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator which i...
COMPARATIVE UPTAKE AND PHYTOEXTRACTION STUDY OF SOIL INDUCED CHROMIUM BY ACCUMULATOR AND HIGH BIOMASS WEED SPECIES
phytoremediation weeds bioconcentration factor transportation index
2010/3/24
Plant species have been recently used for heavy metal accumulation and most of the studies
have been done on hyperaccumulator tolerant species. Metal hyperaccumulator plants though useful to phytoext...