GLUE 发表于 2025-3-25 04:26:44

http://reply.papertrans.cn/16/1555/155469/155469_21.png

STYX 发表于 2025-3-25 10:05:53

http://reply.papertrans.cn/16/1555/155469/155469_22.png

Countermand 发表于 2025-3-25 13:30:26

http://reply.papertrans.cn/16/1555/155469/155469_23.png

BLINK 发表于 2025-3-25 18:08:31

Beyond Threshold Access Structures,Before presenting secret sharing schemes in more advanced adversary models, we next give a short overview of more complex access structures than simple threshold access structures.

骑师 发表于 2025-3-25 23:16:59

http://reply.papertrans.cn/16/1555/155469/155469_25.png

Kindle 发表于 2025-3-26 00:34:25

Verifiable Secret Sharing,So far, we always assumed that the adversary is not able to corrupt the dealer of a secret message.

FOLD 发表于 2025-3-26 08:20:08

http://reply.papertrans.cn/16/1555/155469/155469_27.png

antiquated 发表于 2025-3-26 10:44:50

http://reply.papertrans.cn/16/1555/155469/155469_28.png

他很灵活 发表于 2025-3-26 14:49:16

http://reply.papertrans.cn/16/1555/155469/155469_29.png

针叶类的树 发表于 2025-3-26 18:54:21

http://reply.papertrans.cn/16/1555/155469/155469_30.png
页: 1 2 [3] 4 5
查看完整版本: Titlebook: An Introduction to Secret Sharing; A Systematic Overvie Stephan Krenn,Thomas Lorünser Book 2023 The Editor(s) (if applicable) and The Autho