易弯曲 发表于 2025-3-30 09:46:42

https://doi.org/10.1007/978-1-4020-2887-8 the attack) but appears difficult to achieve the more natural notion of . (where the adversary can make all choices on the go as the attack progresses). A series of several recent works shows how to cleverly achieve adaptive security in several such scenarios including . (Panjwani, TCC ’07 and Fuch

rheumatology 发表于 2025-3-30 12:52:19

https://doi.org/10.1007/978-1-4020-2887-8useful in practice and allows, for instance, secure AES encryption with latency about 1 ms and amortized time about 0.5 .s per AES block on a fast cloud set-up. Another version is interesting from a theoretical point of view: we achieve a maliciously and unconditionally secure 2-party protocol in th

BIPED 发表于 2025-3-30 19:43:36

http://reply.papertrans.cn/15/1476/147528/147528_53.png

气候 发表于 2025-3-30 22:08:31

https://doi.org/10.1007/978-1-4020-2887-8nest adversaries. In all existing protocols, the number of arithmetic operations per multiplication gate grows either linearly with . or polylogarithmically with the security parameter. We present the first protocol that only makes a . (amortized) number of field operations per gate. The protocol us

attenuate 发表于 2025-3-31 04:17:25

http://reply.papertrans.cn/15/1476/147528/147528_55.png

正论 发表于 2025-3-31 06:36:31

http://reply.papertrans.cn/15/1476/147528/147528_56.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Advances in Cryptology – CRYPTO 2017; 37th Annual Internat Jonathan Katz,Hovav Shacham Conference proceedings 2017 International Associatio