白杨鱼 发表于 2025-3-25 06:21:05

http://reply.papertrans.cn/15/1476/147583/147583_21.png

Terrace 发表于 2025-3-25 08:21:12

0302-9743 ations;.Part V: Multi-party computation and zero-knowledge;.Part VI: Multi-party computation and zero-knowledge; classic public key cryptography,.Part VII: Classic public key cryptography..978-3-031-58722-1978-3-031-58723-8Series ISSN 0302-9743 Series E-ISSN 1611-3349

使残废 发表于 2025-3-25 13:00:22

Irma Arriagada,Francisca MirandaThis also enables . in case the double key only depends on the public key. Second, we propose a natural robustness notion, which guarantees that anamorphically decrypting a regularly encrypted message results in a special symbol indicating that no covert message is contained, which also eliminates c

带子 发表于 2025-3-25 19:08:35

Preference Elicitation at the End of Lifeic encryption. We show that some existing homomorphic schemes, (and most notably the fully homomorphic one by Gentry, Sahai and Waters) can be made anamorphic, while retaining their homomorphic properties both with respect to the regular and the covert message..Finally we refine the notion of anamor

Arthr- 发表于 2025-3-25 23:47:12

Terry N. Flynn,Charlie Corke,Elisabeth Huynh namely ., ., ., ., and .. We prove that . security is the strongest notion known so far, that can be achieved by an FHE scheme; in particular, . is strictly stronger than ...Finally, we provide a general transformation, that takes . .-secure FHE scheme and makes it .-secure. Our transformation firs

Patrimony 发表于 2025-3-26 03:50:49

Terry N. Flynn,Charlie Corke,Elisabeth Huynhnterestingly, we may combine our CKKS bootstrapping algorithms for bits with the fast ring packing technique from Bae . . This leads to a new bootstrapping algorithm for DM/CGGI that outperforms the state-of-the-art approaches when the number of bootstraps to be performed simultaneously i

清唱剧 发表于 2025-3-26 07:41:28

http://reply.papertrans.cn/15/1476/147583/147583_27.png

neurologist 发表于 2025-3-26 08:56:35

http://reply.papertrans.cn/15/1476/147583/147583_28.png

松软 发表于 2025-3-26 16:41:28

Conclusion: Asking the Right Questions,0) for lattice-based function-hiding FE, and extend it to the case of compact FE. Concretely, we prove lower bounds for lattice-based compact FE schemes which meet some (natural) algebraic restrictions at encryption and decryption, and have ciphertexts of linear size and secret keys of minimal degre

盟军 发表于 2025-3-26 20:50:37

http://reply.papertrans.cn/15/1476/147583/147583_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Advances in Cryptology – EUROCRYPT 2024; 43rd Annual Internat Marc Joye,Gregor Leander Conference proceedings 2024 International Associatio