易弯曲 发表于 2025-3-30 09:46:42
https://doi.org/10.1007/978-1-4020-2887-8 the attack) but appears difficult to achieve the more natural notion of . (where the adversary can make all choices on the go as the attack progresses). A series of several recent works shows how to cleverly achieve adaptive security in several such scenarios including . (Panjwani, TCC ’07 and Fuchrheumatology 发表于 2025-3-30 12:52:19
https://doi.org/10.1007/978-1-4020-2887-8useful in practice and allows, for instance, secure AES encryption with latency about 1 ms and amortized time about 0.5 .s per AES block on a fast cloud set-up. Another version is interesting from a theoretical point of view: we achieve a maliciously and unconditionally secure 2-party protocol in thBIPED 发表于 2025-3-30 19:43:36
http://reply.papertrans.cn/15/1476/147528/147528_53.png气候 发表于 2025-3-30 22:08:31
https://doi.org/10.1007/978-1-4020-2887-8nest adversaries. In all existing protocols, the number of arithmetic operations per multiplication gate grows either linearly with . or polylogarithmically with the security parameter. We present the first protocol that only makes a . (amortized) number of field operations per gate. The protocol usattenuate 发表于 2025-3-31 04:17:25
http://reply.papertrans.cn/15/1476/147528/147528_55.png正论 发表于 2025-3-31 06:36:31
http://reply.papertrans.cn/15/1476/147528/147528_56.png