GLUE 发表于 2025-3-25 04:26:44
http://reply.papertrans.cn/16/1555/155469/155469_21.pngSTYX 发表于 2025-3-25 10:05:53
http://reply.papertrans.cn/16/1555/155469/155469_22.pngCountermand 发表于 2025-3-25 13:30:26
http://reply.papertrans.cn/16/1555/155469/155469_23.pngBLINK 发表于 2025-3-25 18:08:31
Beyond Threshold Access Structures,Before presenting secret sharing schemes in more advanced adversary models, we next give a short overview of more complex access structures than simple threshold access structures.骑师 发表于 2025-3-25 23:16:59
http://reply.papertrans.cn/16/1555/155469/155469_25.pngKindle 发表于 2025-3-26 00:34:25
Verifiable Secret Sharing,So far, we always assumed that the adversary is not able to corrupt the dealer of a secret message.FOLD 发表于 2025-3-26 08:20:08
http://reply.papertrans.cn/16/1555/155469/155469_27.pngantiquated 发表于 2025-3-26 10:44:50
http://reply.papertrans.cn/16/1555/155469/155469_28.png他很灵活 发表于 2025-3-26 14:49:16
http://reply.papertrans.cn/16/1555/155469/155469_29.png针叶类的树 发表于 2025-3-26 18:54:21
http://reply.papertrans.cn/16/1555/155469/155469_30.png