季雨 发表于 2025-3-26 21:45:35

http://reply.papertrans.cn/15/1476/147549/147549_31.png

BRACE 发表于 2025-3-27 02:57:15

http://reply.papertrans.cn/15/1476/147549/147549_32.png

必死 发表于 2025-3-27 05:49:43

http://reply.papertrans.cn/15/1476/147549/147549_33.png

Brochure 发表于 2025-3-27 12:19:23

https://doi.org/10.1007/978-0-387-48868-4revious positive results in this model do not achieve perfect security, and either assume probabilistic corruption and a nonstandard communication model, or only realize the weaker goal of security-with-abort. The question of matching the BGW result in these settings remained open..In this work, we

合适 发表于 2025-3-27 15:42:08

https://doi.org/10.1007/978-3-642-50115-9lity (e.g., coin-tossing, generation of key-pairs, and so on) in . while making black-box use of two-round oblivious transfer. As an additional result, we construct the first four-round MPC protocol for generic functionalities that makes black-box use of the underlying primitives, achieving security

onlooker 发表于 2025-3-27 18:49:19

http://reply.papertrans.cn/15/1476/147549/147549_36.png

运动的我 发表于 2025-3-28 02:00:14

Effect of blood rheology on cardiac outputheme which statistically erases bits of the message in a few hidden locations. Our scheme achieves nearly optimal ciphertext size and provides statistical security against malicious receivers. Computational security against semi-honest senders holds under the DDH assumption.

archenemy 发表于 2025-3-28 03:27:09

Completeness Theorems for Adaptively Secure Broadcast978-1-349-04549-5

saphenous-vein 发表于 2025-3-28 08:25:45

Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation978-1-349-21155-5

fluffy 发表于 2025-3-28 14:23:39

http://reply.papertrans.cn/15/1476/147549/147549_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Advances in Cryptology – CRYPTO 2023; 43rd Annual Internat Helena Handschuh,Anna Lysyanskaya Conference proceedings 2023 International Asso