Nonthreatening 发表于 2025-3-30 09:18:27
http://reply.papertrans.cn/16/1598/159729/159729_51.png高兴去去 发表于 2025-3-30 16:11:30
http://reply.papertrans.cn/16/1598/159729/159729_52.png凹槽 发表于 2025-3-30 20:22:49
http://reply.papertrans.cn/16/1598/159729/159729_53.pngcajole 发表于 2025-3-30 22:09:39
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext AttackKEM scheme in terms of public key size and encapsulation cost, but is proven to be (still) secure against chosen ciphertext attack in the standard model, relative to the Decisional Diffie-Hellman problem.洁净 发表于 2025-3-31 02:34:38
http://reply.papertrans.cn/16/1598/159729/159729_55.pngfigure 发表于 2025-3-31 07:10:02
Dual-Policy Attribute Based Encryptioncy and Ciphertext-Policy ABE, the two previous available types of ABE. Dual-Policy ABE allows . two access control mechanisms over encrypted data: one involves policies over . attributes ascribed to data and the other involves policies over . attributes ascribed to user credentials. The previous twoligature 发表于 2025-3-31 12:43:41
http://reply.papertrans.cn/16/1598/159729/159729_57.pngstroke 发表于 2025-3-31 14:16:41
http://reply.papertrans.cn/16/1598/159729/159729_58.pngobsession 发表于 2025-3-31 20:10:48
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networkse Doe protocol, which was proposed by Lucks et al., more closely and note its inability to recover in case of a certain adversarial disruption. Our paper saves this well-studied protocol from its unrecoverable state when such adversarial disruption occurs. We propose a new message recognition protocstrdulate 发表于 2025-3-31 22:38:00
Breaking Two ,-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Sizent black-box tracing against self-defensive pirates, where ., . are the total number of subscribers and the maximum number of colluders. After that, in 2006, they presented a hierarchical key assignment method to reduce the ciphertext size into 4. + 5 + log(./2.) by combining a complete binary tree