Prosaic 发表于 2025-3-23 13:03:51

https://doi.org/10.1007/978-981-99-7566-2rentiability, the current leading method for this task, are the ability to handle multi-stage games and greater efficiency. The paradigm consists of (1) Showing that a VIL UCE function can instantiate the VIL RO in the scheme, and (2) Constructing the VIL UCE function given a FIL random oracle. The

琐碎 发表于 2025-3-23 15:29:33

http://reply.papertrans.cn/15/1476/147521/147521_12.png

凹槽 发表于 2025-3-23 21:20:52

http://reply.papertrans.cn/15/1476/147521/147521_13.png

干旱 发表于 2025-3-23 23:08:01

https://doi.org/10.1007/978-981-99-7566-2raphic features to ideal multilinear maps. In fact, the scheme of Coron . is the second proposal of a secure GES, and has advantages over the first scheme of Garg, Gentry, and Halevi (GGH). For example, unlike the GGH construction, the subgroup decision assumption holds in the CLT construction. Imme

VEN 发表于 2025-3-24 02:45:04

http://reply.papertrans.cn/15/1476/147521/147521_15.png

合唱团 发表于 2025-3-24 07:20:51

http://reply.papertrans.cn/15/1476/147521/147521_16.png

突袭 发表于 2025-3-24 11:24:37

https://doi.org/10.1007/978-981-99-7566-2ranks, there is no good algorithm that decides whether a given lattice has an orthonormal basis. But when the lattice is given with enough symmetry, we can construct a provably deterministic polynomial time algorithm to accomplish this, based on the work of Gentry and Szydlo. The techniques involve

慢慢啃 发表于 2025-3-24 18:02:02

http://reply.papertrans.cn/15/1476/147521/147521_18.png

absolve 发表于 2025-3-24 20:02:11

Tahmeena Khan,Saman Raza,Qazi Inamur Rahmanal loss in k. We improve and extend it to an LWE to .-LWE reduction with a polynomial loss in ., by relying on a new technique involving trapdoors for random integer kernel lattices. Based on this hardness result, we present the first algebraic construction of a traitor tracing scheme whose security

Scleroderma 发表于 2025-3-25 02:20:12

https://doi.org/10.1007/978-981-97-0240-4st Vector Problem in ideal lattices within polynomial factors. The distinguishing feature of our scheme is that it achieves . signatures (consisting of a single lattice vector), and . public keys (consisting of .(log.) vectors.) Previous lattice schemes in the standard model with similarly . signatu
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Advances in Cryptology -- CRYPTO 2014; 34th Annual Cryptolo Juan A. Garay,Rosario Gennaro Conference proceedings 2014 International Associa