季雨 发表于 2025-3-26 21:45:35
http://reply.papertrans.cn/15/1476/147549/147549_31.pngBRACE 发表于 2025-3-27 02:57:15
http://reply.papertrans.cn/15/1476/147549/147549_32.png必死 发表于 2025-3-27 05:49:43
http://reply.papertrans.cn/15/1476/147549/147549_33.pngBrochure 发表于 2025-3-27 12:19:23
https://doi.org/10.1007/978-0-387-48868-4revious positive results in this model do not achieve perfect security, and either assume probabilistic corruption and a nonstandard communication model, or only realize the weaker goal of security-with-abort. The question of matching the BGW result in these settings remained open..In this work, we合适 发表于 2025-3-27 15:42:08
https://doi.org/10.1007/978-3-642-50115-9lity (e.g., coin-tossing, generation of key-pairs, and so on) in . while making black-box use of two-round oblivious transfer. As an additional result, we construct the first four-round MPC protocol for generic functionalities that makes black-box use of the underlying primitives, achieving securityonlooker 发表于 2025-3-27 18:49:19
http://reply.papertrans.cn/15/1476/147549/147549_36.png运动的我 发表于 2025-3-28 02:00:14
Effect of blood rheology on cardiac outputheme which statistically erases bits of the message in a few hidden locations. Our scheme achieves nearly optimal ciphertext size and provides statistical security against malicious receivers. Computational security against semi-honest senders holds under the DDH assumption.archenemy 发表于 2025-3-28 03:27:09
Completeness Theorems for Adaptively Secure Broadcast978-1-349-04549-5saphenous-vein 发表于 2025-3-28 08:25:45
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation978-1-349-21155-5fluffy 发表于 2025-3-28 14:23:39
http://reply.papertrans.cn/15/1476/147549/147549_40.png