Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (6)

Search Parameters:
Keywords = circom

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 911 KB  
Article
Constraint-Efficient Comparators via Weighted Accumulation
by Marc Guzmán-Albiol, Marta Bellés-Muñoz, Rafael Genés-Durán and Jose Luis Muñoz-Tapia
Mathematics 2025, 13(24), 3959; https://doi.org/10.3390/math13243959 - 12 Dec 2025
Viewed by 514
Abstract
This article presents an optimized method for verifying the comparison of two binary numbers using the rank-1 constraint system (R1CS) representation, a standard framework for verifiable computation systems. In particular, we analyze different strategies for implementing strict comparisons of the form [...] Read more.
This article presents an optimized method for verifying the comparison of two binary numbers using the rank-1 constraint system (R1CS) representation, a standard framework for verifiable computation systems. In particular, we analyze different strategies for implementing strict comparisons of the form t>K, where K is a known constant and t is an integer input to the comparison. We first analyze a lexicographic approach that, although conceptually straightforward, results in a large number of constraints due to its branching logic. To address this inefficiency, we introduce a weighted-accumulation method that computes an accumulator whose sign determines the comparison outcome. By assigning position-dependent weights to bit pairs and formulating the computation through degree-2 constraints, this method eliminates branching and significantly reduces the total number of constraints. In order to validate our designs, we implemented the described comparison algorithms in an R1CS compiler called circom, allowing us to generate and analyze the corresponding R1CS constraint systems in practice. Overall, the presented design not only ensures correctness but also demonstrates how careful exploitation of the R1CS structure can lead to efficient constraint settings. Full article
(This article belongs to the Special Issue Applied Cryptography and Information Security with Application)
Show Figures

Figure 1

11 pages, 228 KB  
Article
Secure Processing and Distribution of Data Managed on Private InterPlanetary File System Using Zero-Knowledge Proofs
by Kyohei Shibano, Kensuke Ito, Changhee Han, Tsz Tat Chu, Wataru Ozaki and Gento Mogi
Electronics 2024, 13(15), 3025; https://doi.org/10.3390/electronics13153025 - 31 Jul 2024
Viewed by 2330
Abstract
In this study, a new data-sharing method is proposed that uses a private InterPlanetary File System—a decentralized storage system operated within a closed network—to distribute data to external entities while making its authenticity verifiable. Among the two operational modes of IPFS, public and [...] Read more.
In this study, a new data-sharing method is proposed that uses a private InterPlanetary File System—a decentralized storage system operated within a closed network—to distribute data to external entities while making its authenticity verifiable. Among the two operational modes of IPFS, public and private, this study focuses on the method for using private IPFS. Private IPFS is not open to the general public; although it poses a risk of data tampering when distributing data to external parties, the proposed method ensures the authenticity of the received data. In particular, this method applies a type of zero-knowledge proof, namely, the Groth16 protocol of zk-SNARKs, to ensure that the data corresponds to the content identifier in a private IPFS. Moreover, the recipient’s name is embedded into the distributed data to prevent unauthorized secondary distribution. Experiments confirmed the effectiveness of the proposed method for an image data size of up to 120 × 120 pixels. In future studies, the proposed method will be applied to larger and more diverse data types. Full article
(This article belongs to the Special Issue Security, Privacy, Confidentiality and Trust in Blockchain)
Show Figures

Figure 1

13 pages, 1162 KB  
Article
Disinformation and Verification in a Digital Society: An Analysis of Strategies and Policies Applied in the European Regional TV Broadcasters of the CIRCOM Network
by Jose Rúas-Araújo, Talia Rodríguez-Martelo and Julia Fontenla-Pedreira
Societies 2023, 13(4), 81; https://doi.org/10.3390/soc13040081 - 27 Mar 2023
Cited by 6 | Viewed by 3781
Abstract
The recent COVID-19 health crisis has shone a spotlight on disinformation as the circulation of false information became more and more prominent. What the World Health Organization (WHO) has defined as an ‘infodemic’ poses a great risk for democracies and for society in [...] Read more.
The recent COVID-19 health crisis has shone a spotlight on disinformation as the circulation of false information became more and more prominent. What the World Health Organization (WHO) has defined as an ‘infodemic’ poses a great risk for democracies and for society in general. In this context, public television channels, with their regional scope, actively participate in the fight against misinformation. This research aims to identify and classify the different verification initiatives and technological tools, as well as the different strategies and codes used in fact-checking tasks by European broadcasters belonging to the CIRCOM network. The methodology undertakes an exploratory approach and employs a questionnaire that is applied to a sample of the members of the network. Managers and professionals with executive profiles were asked about the management, operation and strategies used in the verification process. In light of the results obtained, it can be concluded that the current verification processes are based on human efforts, rather than technological tools, amounting to a total dependence on content curation by the writing teams in the newsroom. Thus, it is evidenced that in most cases, there is neither a specific department for verification, nor sufficient resources, despite the fact that all those surveyed regard disinformation as a priority issue, a threat to democratic integrity and a responsibility of public service media. Full article
Show Figures

Figure 1

12 pages, 304 KB  
Article
Verification Systems and Programs in Regional Television Stations That Are Members of the CIRCOM Network
by José Rúas-Araújo, Talía Rodríguez-Martelo and Carmen Máiz-Bar
Journal. Media 2022, 3(1), 1-12; https://doi.org/10.3390/journalmedia3010001 - 22 Dec 2021
Cited by 3 | Viewed by 4201
Abstract
Disinformation and the proliferation of fake news are global problems that affect the stability of democracies throughout the world. The capacity of distorted information to interfere in election processes or in political agendas has led different actors to create verification initiatives, which operate [...] Read more.
Disinformation and the proliferation of fake news are global problems that affect the stability of democracies throughout the world. The capacity of distorted information to interfere in election processes or in political agendas has led different actors to create verification initiatives, which operate in partnership with the mass media. Recently, during the 2020 health crisis, false information has proved to have damaging power not only at the levels of politics or communication, but also at a health level. Therefore, the social need to access reliable and quality information, as well as verified information aimed at eradicating hoaxes, becomes evident. This paper focuses on the European context, analyzing the relationship between active verifiers and television stations that are members of the CIRCOM Network, considering their strategies and verification programs. Using a qualitative methodology an exploratory study has been carried out, mapping initiatives and stations by assessing their contribution of verified information to society. Full article
14 pages, 1780 KB  
Review
Integration of Bioinformatic Predictions and Experimental Data to Identify circRNA-miRNA Associations
by Martina Dori and Silvio Bicciato
Genes 2019, 10(9), 642; https://doi.org/10.3390/genes10090642 - 24 Aug 2019
Cited by 85 | Viewed by 7144
Abstract
Circular RNAs (circRNAs) have recently emerged as a novel class of transcripts, characterized by covalently linked 3′–5′ ends that result in the so-called backsplice junction. During the last few years, thousands of circRNAs have been identified in different organisms. Yet, despite their role [...] Read more.
Circular RNAs (circRNAs) have recently emerged as a novel class of transcripts, characterized by covalently linked 3′–5′ ends that result in the so-called backsplice junction. During the last few years, thousands of circRNAs have been identified in different organisms. Yet, despite their role as disease biomarker started to emerge, depicting their function remains challenging. Different studies have shown that certain circRNAs act as miRNA sponges, but any attempt to generalize from the single case to the “circ-ome” has failed so far. In this review, we explore the potential to define miRNA “sponging” as a more general function of circRNAs and describe the different approaches to predict miRNA response elements (MREs) in known or novel circRNA sequences. Moreover, we discuss how experiments based on Ago2-IP and experimentally validated miRNA:target duplexes can be used to either prioritize or validate putative miRNA-circRNA associations. Full article
(This article belongs to the Special Issue RNA Target Prediction Methods)
Show Figures

Figure 1

22 pages, 4524 KB  
Review
Barcoding of Plant Viruses with Circular Single-Stranded DNA Based on Rolling Circle Amplification
by Holger Jeske
Viruses 2018, 10(9), 469; https://doi.org/10.3390/v10090469 - 31 Aug 2018
Cited by 18 | Viewed by 8420
Abstract
The experience with a diagnostic technology based on rolling circle amplification (RCA), restriction fragment length polymorphism (RFLP) analyses, and direct or deep sequencing (Circomics) over the past 15 years is surveyed for the plant infecting geminiviruses, nanoviruses and associated satellite DNAs, which have [...] Read more.
The experience with a diagnostic technology based on rolling circle amplification (RCA), restriction fragment length polymorphism (RFLP) analyses, and direct or deep sequencing (Circomics) over the past 15 years is surveyed for the plant infecting geminiviruses, nanoviruses and associated satellite DNAs, which have had increasing impact on agricultural and horticultural losses due to global transportation and recombination-aided diversification. Current state methods for quarantine measures are described to identify individual DNA components with great accuracy and to recognize the crucial role of the molecular viral population structure as an important factor for sustainable plant protection. Full article
(This article belongs to the Section Viruses of Plants, Fungi and Protozoa)
Show Figures

Graphical abstract

Back to TopTop