白杨鱼 发表于 2025-3-25 06:21:05
http://reply.papertrans.cn/15/1476/147583/147583_21.pngTerrace 发表于 2025-3-25 08:21:12
0302-9743 ations;.Part V: Multi-party computation and zero-knowledge;.Part VI: Multi-party computation and zero-knowledge; classic public key cryptography,.Part VII: Classic public key cryptography..978-3-031-58722-1978-3-031-58723-8Series ISSN 0302-9743 Series E-ISSN 1611-3349使残废 发表于 2025-3-25 13:00:22
Irma Arriagada,Francisca MirandaThis also enables . in case the double key only depends on the public key. Second, we propose a natural robustness notion, which guarantees that anamorphically decrypting a regularly encrypted message results in a special symbol indicating that no covert message is contained, which also eliminates c带子 发表于 2025-3-25 19:08:35
Preference Elicitation at the End of Lifeic encryption. We show that some existing homomorphic schemes, (and most notably the fully homomorphic one by Gentry, Sahai and Waters) can be made anamorphic, while retaining their homomorphic properties both with respect to the regular and the covert message..Finally we refine the notion of anamorArthr- 发表于 2025-3-25 23:47:12
Terry N. Flynn,Charlie Corke,Elisabeth Huynh namely ., ., ., ., and .. We prove that . security is the strongest notion known so far, that can be achieved by an FHE scheme; in particular, . is strictly stronger than ...Finally, we provide a general transformation, that takes . .-secure FHE scheme and makes it .-secure. Our transformation firsPatrimony 发表于 2025-3-26 03:50:49
Terry N. Flynn,Charlie Corke,Elisabeth Huynhnterestingly, we may combine our CKKS bootstrapping algorithms for bits with the fast ring packing technique from Bae . . This leads to a new bootstrapping algorithm for DM/CGGI that outperforms the state-of-the-art approaches when the number of bootstraps to be performed simultaneously i清唱剧 发表于 2025-3-26 07:41:28
http://reply.papertrans.cn/15/1476/147583/147583_27.pngneurologist 发表于 2025-3-26 08:56:35
http://reply.papertrans.cn/15/1476/147583/147583_28.png松软 发表于 2025-3-26 16:41:28
Conclusion: Asking the Right Questions,0) for lattice-based function-hiding FE, and extend it to the case of compact FE. Concretely, we prove lower bounds for lattice-based compact FE schemes which meet some (natural) algebraic restrictions at encryption and decryption, and have ciphertexts of linear size and secret keys of minimal degre盟军 发表于 2025-3-26 20:50:37
http://reply.papertrans.cn/15/1476/147583/147583_30.png