上腭 发表于 2025-3-28 16:14:19
http://reply.papertrans.cn/15/1477/147629/147629_41.pngnettle 发表于 2025-3-28 19:49:02
0302-9743 echniques, EUROCRYPT ‘94, held in Perugia, Italy in May 1994..The 36 revised full papers presented in the book are selected from 137 submissions and address all current research and advanced applicational aspects of cryptography; in addition, there are 11 short papers originating from the best speci植物茂盛 发表于 2025-3-29 00:12:38
Case Studies in Forensic Epidemiologye to cooperate to generate a valid group signature and suspected forgery implies traceability of adversarial shareholders. The validity of that signature for the specific group can be verified without knowing the membership of the signers to that group.Host142 发表于 2025-3-29 04:07:59
http://reply.papertrans.cn/15/1477/147629/147629_44.pngEmmenagogue 发表于 2025-3-29 10:00:25
Laura Bigliardi,Giuliano Sansebastianoealized as information rate by means of the generalized vector space construction. If so, the algorithm produces a perfect secret sharing scheme with this information rate. As a side-result we show a correspondence between the duality of access structures and the duality of codes.Irrigate 发表于 2025-3-29 13:41:41
http://reply.papertrans.cn/15/1477/147629/147629_46.pngprick-test 发表于 2025-3-29 15:57:34
Case Studies in Forensic Epidemiologyvariant of the DSA requires computing of inverses in both generation and verification of signatures. In two applications of message recovery were proposed. In the present paper it is shown how to combine ElGamal encryption and the message recovery scheme of and how to securely integrate the DSA into Diffie-Hellman key exchange.gustation 发表于 2025-3-29 21:38:25
Antonis Skilourakis,Elefteria Psillakising scheme must give some participant a share which is at least about ./log . times the secret size. We also show that the best possible result achievable by the information theoretic method used here is . times the secret size.前面 发表于 2025-3-30 00:46:01
Case Studies in Forensic Epidemiologyparties can confirm the signature without the signer. But the signer is protected, since unless sufficient designated parties cooperate in confirmation, the signature is no more convincing than any other number.一起平行 发表于 2025-3-30 07:44:53
Case Studies in Forensic Epidemiologyadversary can create ciphertexts only of strings for which she “knows” the corresponding plaintexts—such a scheme is not only semantically secure but also non-malleable and secure against chosen-ciphertext attack.