Skip to content

“大家一边要参加应用项目开发,同时也要加强基础理论学习。请大家一定要抓紧时间”

Notifications You must be signed in to change notification settings

MonteCarloClub/PaperNote

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

75 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PaperNote

大家读完论文之后,要思考,这篇论文的优点缺点是什么、能不能做广一点深一点、可以用在哪些场景,等等,每一篇论文都是不完善的,可以继续思考的。

不能读完了就结束了,完成任务一样,这样没有什么效果的

〇、说明

PaperNote 用来存储我们读过的论文及笔记、学术会议记录等。

papers 目录存储论文原文,根据类别整理。

notes 目录存储笔记,建议写成Markdown格式。

其他目录根据需要创建。

以下内容请分类整理,例如物流算法、密码学、……

一、基于属性的加密

Goyal V , Pandey O , Sahai A , et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006. ACM, 2006.

冯登国, 陈成. 属性密码学研究[J]. 密码学报, 2014(01):10-21.

Sahai A , Seyalioglu H , Waters B . Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption[C]// Annual Cryptology Conference. Springer, Berlin, Heidelberg, 2012.

Lewko A , Waters B . Decentralizing Attribute-Based Encryption[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2011.

Ding S , Zhao Y , Liu Y . Efficient Traceable Attribute-Based Signature[C]// IEEE International Conference on Trust. IEEE, 2015.

二、零知识证明

Goldreich O . A Short Tutorial of Zero-Knowledge[J]. Cryptology and Information Security Series, 2013, 10:28-60.

Interactive Proofs (Sum-check Protocol and Arithmetization)

How to Build SNARKs

三、区块链+物联网

Ourad A Z , Belgacem B , Salah K . Using Blockchain for IOT Access Control and Authentication Management[J]. 2018.

Misra S , Mukherjee A , Roy A , et al. Blockchain at the Edge: Performance of Resource-Constrained IoT Networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2020, 32(1):174-183.

四、区块链交易

Naumenko G , Maxwell G , Wuille P , et al. Erlay: Efficient Transaction Relay for Bitcoin[C]. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019:817–831.

Karl W , Loris D , Kari Kostiainen , et al. Bitcontracts: Supporting Smart Contracts in Legacy Blockchains[C]. The Network and Distributed System Security Symposium (NDSS) 2021.

Graphene- Efficient Interactive Set Reconciliation Applied to Blockchain

五、跨链操作

Zhuotao Liu, Yangxi Xiang, Jian Shi, et al. HyperService: Interoperability and Programmability Across Heterogeneous Blockchains[C]. CCS, 2019:817–831.

六、分布式系统安全

Guo Y , Pass R , Shi E . Synchronous, with a Chance of Partition Tolerance[J]. Springer, Cham, 2019.

七、区块链的扩展性

Towards Scaling Blockchain Systems via Sharding

D. Deuber, B. Magri and S. A. K. Thyagarajan, "Redactable Blockchain in the Permissionless Setting," 2019 IEEE Symposium on Security and Privacy (SP), 2019, pp. 124-138, doi: 10.1109/SP.2019.00039.

八、算法与计算复杂性

Introduction to Theoretical Computer Science

九、真实世界网络

Xiao, Yunpeng & Yang, Qiufan & Sang, Chunyan & Liu, Yanbing. (2020). Rumor Diffusion Model Based on Representation Learning and Anti-Rumor. IEEE Transactions on Network and Service Management. PP. 1-1. 10.1109/TNSM.2020.2994141.

十、密码分析(Cryptanalysis)

H M. A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS[J]. Cryptologia, 2002, 26(3):189–221. DOI: 10.1080/0161-110291890885.

Benamira, David Gerault, Thomas Peyrin, et al. A Deeper Look at Machine Learning-Based Cryptanalysis, 2021.

十一、数据库

Defferrard M , Benzi K , Vandergheynst P , et al. FMA: A Dataset For Music Analysis[J]. 2016.

十二、比特币+签名

Schnorr, C.P. Efficient signature generation by smart cards. J. Cryptology 4, 161–174 (1991). https://doi.org/10.1007/BF00196725

Johnson, D., Menezes, A. & Vanstone, S. The Elliptic Curve Digital Signature Algorithm (ECDSA). IJIS 1, 36–63 (2001). https://doi.org/10.1007/s102070100002

Maxwell, G., Poelstra, A., Seurin, Y. et al. Simple Schnorr multi-signatures with applications to Bitcoin. Des. Codes Cryptogr. 87, 2139–2164 (2019). https://doi.org/10.1007/s10623-019-00608-x

十三、去中心化身份

MARAM D, MALVAI H, ZHANG F, et al. Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability[M]. Institute of Electrical and Electronics Engineers Inc., 2021.

十四、现代密码学:原理与协议

Chapter 1 & 2: Introduction & Perfectly Secret Encryption

About

“大家一边要参加应用项目开发,同时也要加强基础理论学习。请大家一定要抓紧时间”

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages