生气地 发表于 2025-3-27 00:32:16
https://doi.org/10.1007/978-3-642-60956-5ly claim that a signature he produced is indeed his own, or not. Any of these guarantees might be desirable. For instance, a whistleblower might have reason to want to later claim an anonymously released signature, or a person falsely implicated in a crime associated with a ring signature might wish无聊的人 发表于 2025-3-27 02:56:40
http://reply.papertrans.cn/15/1476/147534/147534_32.png舰旗 发表于 2025-3-27 08:09:02
Michael D. Trudeau,David E. Schullerrespect to algebraic attack model or ideal model, our attack shows that this algebraic security is not enough to achieve indistinguishability obfuscation. In particular, we show that the obfuscation scheme suggested by Bartusek . (TCC’18) does not achieve the desired security in a certain parameter加花粗鄙人 发表于 2025-3-27 10:23:02
http://reply.papertrans.cn/15/1476/147534/147534_34.pngErgots 发表于 2025-3-27 13:40:58
http://reply.papertrans.cn/15/1476/147534/147534_35.png老巫婆 发表于 2025-3-27 21:10:08
Chin Xuan Tan,Seok Shin Tan,Seok Tyug Tan standard algebraic assumptions that imply public-key encryption (e.g., factoring, discrete log, or lattice assumptions). Our schemes also satisfy a number of appealing properties: public marking, public mark-extraction, and collusion resistance. Our schemes are the first to simultaneously achieve a独特性 发表于 2025-3-28 00:34:55
http://reply.papertrans.cn/15/1476/147534/147534_37.png量被毁坏 发表于 2025-3-28 04:22:31
http://reply.papertrans.cn/15/1476/147534/147534_38.pngflourish 发表于 2025-3-28 08:03:21
http://reply.papertrans.cn/15/1476/147534/147534_39.png反抗者 发表于 2025-3-28 14:20:42
http://reply.papertrans.cn/15/1476/147534/147534_40.png