2023
DOI: 10.32604/csse.2023.030646
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Timestamp Mechanism Based on Verifiable Delay Functions

Abstract: In the data communication system, the real-time information interaction of communication device increases the risk of privacy sensitive data being tampered with. Therefore, maintaining data security is one of the most important issues in network data communication. Because the timestamp is the most important way to authenticate data in information interaction, it is very necessary to provide timestamp service in the data communication system. However, the existing centralized timestamp mechanism is difficult t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 45 publications
0
8
0
Order By: Relevance
“…The ICF-CY theory and method are used to describe the functional and health status of children and adolescents, and the concept can be applied to systematically and precisely access children with cerebral palsy by combining it with clinical treatment [9,10], and to guide the formulation of a treatment plan that meets with individualized and precise rehabilitation and to provide systematic and comprehensive treatment interventions for all aspects of the child [11][12][13], especially abandoning the past principles of focusing only on movement disorders and neglecting the improvement of cognitive and self-care abilities, or the same treatment plan that ignores individualized individualized differences [14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…The ICF-CY theory and method are used to describe the functional and health status of children and adolescents, and the concept can be applied to systematically and precisely access children with cerebral palsy by combining it with clinical treatment [9,10], and to guide the formulation of a treatment plan that meets with individualized and precise rehabilitation and to provide systematic and comprehensive treatment interventions for all aspects of the child [11][12][13], especially abandoning the past principles of focusing only on movement disorders and neglecting the improvement of cognitive and self-care abilities, or the same treatment plan that ignores individualized individualized differences [14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…MobileNetv3-YOLOv4-Inceptionv3 introduces Inceptionv3 as the detection network and uses MobileNetV3 as the feature extraction network. In general, the comprehensive comparative analysis of different algorithms can verify the necessity of the modifications made in this paper, and the detection performance of the improved algorithm is better than other algorithms [26].…”
Section: Resultsmentioning
confidence: 70%
“…In 2019, Landerreche et al [ 54 ] presented the first treatment of non-interactive publicly verifiable timestamping schemes and a secure timestamping scheme based on a verifiable delay function is proved. The timestamping scheme [ 55 ] consists of sequence of verifiable delay function proofs linked to each other by a cryptographic hash function, modeled as a sequence of random oracles. Add verifiable delay functions to the sequence to increase the structure, thus preserving the safety guarantees of the structure.…”
Section: Verifiable Delay Functions Applicationsmentioning
confidence: 99%