zkSNARKs in the ROM with Unconditional UC-Security.
Alessandro ChiesaGiacomo FenziPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- security requirements
- intrusion detection
- information security
- security policies
- security issues
- security systems
- access control
- functional requirements
- security vulnerabilities
- network security
- statistical databases
- computer security
- information systems
- security problems
- security analysis
- security mechanisms
- data management
- cyber security
- data security
- security model
- cyber attacks
- security properties
- security threats
- neural network
- information assurance