扔掉掐死你 发表于 2025-3-28 14:55:42

http://reply.papertrans.cn/15/1475/147471/147471_41.png

Resistance 发表于 2025-3-28 22:29:53

https://doi.org/10.1007/978-3-531-90922-6knowledge. This recently proposed notion of zero knowledge deals with an adversary that can make leakage queries on the state of the prover. Our result holds for black-box simulation only and we also give some insights on the non-black-box case. Additionally, we show that, for several functionalitie

NATTY 发表于 2025-3-29 02:51:34

http://reply.papertrans.cn/15/1475/147471/147471_43.png

evanescent 发表于 2025-3-29 05:04:01

http://reply.papertrans.cn/15/1475/147471/147471_44.png

小卷发 发表于 2025-3-29 08:43:30

http://reply.papertrans.cn/15/1475/147471/147471_45.png

巨头 发表于 2025-3-29 13:46:14

http://reply.papertrans.cn/15/1475/147471/147471_46.png

decode 发表于 2025-3-29 15:35:02

The Case of Industrial Symbiosis hold under adversarially chosen keys. This is substantiated by several impossibility results. The only construction that can be termed theoretically efficient, by Garg and Gupta (.’14), requires complexity leveraging, inducing an exponential security loss..We present a construction of practically e

Ingenuity 发表于 2025-3-29 22:15:12

Context Modelling in Capability Management and Kiltz at Crypto 2008, with two main differences. First, an APHF works over bilinear groups, and it is asymmetric in the sense that, while only . computable, it admits an isomorphic copy which is publicly computable. Second, in addition to the usual programmability, APHFs may have an alternative

Prophylaxis 发表于 2025-3-30 01:48:20

Capability Management in Digital Enterprisess applications in public-key cryptography. We present new, simple and improved SPS constructions under standard assumptions via a conceptually different approach. Our constructions significantly narrow the gap between existing constructions from standard assumptions and optimal schemes in the generi

LEER 发表于 2025-3-30 06:22:10

Ulrich Czubayko,Hasan Koç,Jan-Christian Kuhr. In the standard model (without the random oracle idealization), the most efficient constructions rely on the Groth-Sahai proof systems (Eurocrypt’08). The structure-preserving signatures of Abe . (Asiacrypt’12) make it possible to design group signatures based on well-established, constant-size nu
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Advances in Cryptology -- CRYPTO 2015; 35th Annual Cryptolo Rosario Gennaro,Matthew Robshaw Conference proceedings 2015 International Assoc