阴险 发表于 2025-3-23 10:32:05

,Law, Politics, and Sovereignty: 1919–1923, It is an identity-based signature scheme in which each signature can be used only once. We called such schemes “bounded life-span”. It is based on mental games and it uses zero-knowledge tools. A validation center is needed to initialize this identity-based scheme. A credential center is used to in

confederacy 发表于 2025-3-23 16:02:04

Carl Schmitt on Law and Liberalismefficient and flexible than the previously proposed methods, especially in the case where the amount of storage available is very small or quite large. It is also very efficient in computing .... for a small size . and variable number ., which occurs in the verification of Schnorr’s identification s

唤醒 发表于 2025-3-23 21:47:08

http://reply.papertrans.cn/15/1477/147608/147608_13.png

Grandstand 发表于 2025-3-24 01:28:57

Carl Schmitt und die Liberalismuskritikbility of turbulence is well-understood mathematically; it reduces not to computational complexity, but to information losses. By timing disk accesses, a program can efficiently extract at least 100 independent, unbiased bits per minute, at no hardware cost. This paper has three parts: a mathematica

medieval 发表于 2025-3-24 05:59:21

Carl Schmitt — Ein deutsches Schicksal. times. This multiround authentication makes it possible to limit the key size independently of the message length. We propose a new attack and show that the probability analysis made by Gemmell and Naor, which was only based on the minimum distance property of the codes, does not hold for our atta

investigate 发表于 2025-3-24 07:22:52

http://reply.papertrans.cn/15/1477/147608/147608_16.png

happiness 发表于 2025-3-24 11:49:50

http://reply.papertrans.cn/15/1477/147608/147608_17.png

铁塔等 发表于 2025-3-24 14:59:51

https://doi.org/10.1057/9781137466594ward a general theory of multi-secret sharing schemes by using an information theoretical framework. We prove lower bounds on the size of information held by each participant for various access structures. Finally, we prove the optimality of the bounds by providing protocols.

bifurcate 发表于 2025-3-24 20:54:34

https://doi.org/10.1057/9781137466594rs but only use simple operations (see [., .]). One was presented at the CRYPTO 89 rump session ([.]) and depends on the so-called Permuted Kernel problem (PKP). Another appeared in the CRYPTO 93 proceedings and is based on the syndrome decoding problem (SD) form the theory of error correcting codes

obnoxious 发表于 2025-3-24 23:48:26

https://doi.org/10.1057/9781137466594have a secret sharing scheme . on . participants. Then under certain assumptions on . and ., we show how to transform . into a witness indistinguishable protocol, in which the prover demonstrates knowledge of the solution to some subset of . problem instances out of a collection of subsets defined b
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Advances in Cryptology — CRYPTO ’94; 14th Annual Internat Yvo G. Desmedt Conference proceedings 1994 Springer-Verlag Berlin Heidelberg 1994