大家读完论文之后,要思考,这篇论文的优点缺点是什么、能不能做广一点深一点、可以用在哪些场景,等等,每一篇论文都是不完善的,可以继续思考的。
不能读完了就结束了,完成任务一样,这样没有什么效果的
PaperNote
用来存储我们读过的论文及笔记、学术会议记录等。
papers
目录存储论文原文,根据类别整理。
notes
目录存储笔记,建议写成Markdown格式。
其他目录根据需要创建。
以下内容请分类整理,例如物流算法、密码学、……
Goyal V , Pandey O , Sahai A , et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006. ACM, 2006.
冯登国, 陈成. 属性密码学研究[J]. 密码学报, 2014(01):10-21.
Sahai A , Seyalioglu H , Waters B . Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption[C]// Annual Cryptology Conference. Springer, Berlin, Heidelberg, 2012.
Lewko A , Waters B . Decentralizing Attribute-Based Encryption[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2011.
Ding S , Zhao Y , Liu Y . Efficient Traceable Attribute-Based Signature[C]// IEEE International Conference on Trust. IEEE, 2015.
Goldreich O . A Short Tutorial of Zero-Knowledge[J]. Cryptology and Information Security Series, 2013, 10:28-60.
Interactive Proofs (Sum-check Protocol and Arithmetization)
How to Build SNARKs
Ourad A Z , Belgacem B , Salah K . Using Blockchain for IOT Access Control and Authentication Management[J]. 2018.
Misra S , Mukherjee A , Roy A , et al. Blockchain at the Edge: Performance of Resource-Constrained IoT Networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2020, 32(1):174-183.
Naumenko G , Maxwell G , Wuille P , et al. Erlay: Efficient Transaction Relay for Bitcoin[C]. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019:817–831.
Karl W , Loris D , Kari Kostiainen , et al. Bitcontracts: Supporting Smart Contracts in Legacy Blockchains[C]. The Network and Distributed System Security Symposium (NDSS) 2021.
Graphene- Efficient Interactive Set Reconciliation Applied to Blockchain
Zhuotao Liu, Yangxi Xiang, Jian Shi, et al. HyperService: Interoperability and Programmability Across Heterogeneous Blockchains[C]. CCS, 2019:817–831.
Guo Y , Pass R , Shi E . Synchronous, with a Chance of Partition Tolerance[J]. Springer, Cham, 2019.
Towards Scaling Blockchain Systems via Sharding
D. Deuber, B. Magri and S. A. K. Thyagarajan, "Redactable Blockchain in the Permissionless Setting," 2019 IEEE Symposium on Security and Privacy (SP), 2019, pp. 124-138, doi: 10.1109/SP.2019.00039.
Introduction to Theoretical Computer Science
Xiao, Yunpeng & Yang, Qiufan & Sang, Chunyan & Liu, Yanbing. (2020). Rumor Diffusion Model Based on Representation Learning and Anti-Rumor. IEEE Transactions on Network and Service Management. PP. 1-1. 10.1109/TNSM.2020.2994141.
H M. A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS[J]. Cryptologia, 2002, 26(3):189–221. DOI: 10.1080/0161-110291890885.
Benamira, David Gerault, Thomas Peyrin, et al. A Deeper Look at Machine Learning-Based Cryptanalysis, 2021.
Defferrard M , Benzi K , Vandergheynst P , et al. FMA: A Dataset For Music Analysis[J]. 2016.
Schnorr, C.P. Efficient signature generation by smart cards. J. Cryptology 4, 161–174 (1991). https://doi.org/10.1007/BF00196725
Johnson, D., Menezes, A. & Vanstone, S. The Elliptic Curve Digital Signature Algorithm (ECDSA). IJIS 1, 36–63 (2001). https://doi.org/10.1007/s102070100002
Maxwell, G., Poelstra, A., Seurin, Y. et al. Simple Schnorr multi-signatures with applications to Bitcoin. Des. Codes Cryptogr. 87, 2139–2164 (2019). https://doi.org/10.1007/s10623-019-00608-x
MARAM D, MALVAI H, ZHANG F, et al. Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability[M]. Institute of Electrical and Electronics Engineers Inc., 2021.
Chapter 1 & 2: Introduction & Perfectly Secret Encryption