Cervical-Spine 发表于 2025-3-27 00:46:04

http://reply.papertrans.cn/16/1598/159734/159734_31.png

友好关系 发表于 2025-3-27 01:57:53

,War’s Unintended Consequences,n the cryptographic model. Based on the ideas of these protocols and the two-dimensional verifiable secret sharing scheme, we propose a protocol for private set intersection in the information-theoretic model. By representing the sets as polynomials, the set intersection problem is converted into th

Bridle 发表于 2025-3-27 08:59:12

http://reply.papertrans.cn/16/1598/159734/159734_33.png

bromide 发表于 2025-3-27 10:07:18

Engineering Design and Society,f values using a short accumulator and to efficiently compute a membership witness of any value that has been accumulated. Unlike traditional accumulators, this scheme also enables one to efficiently compute a nonmembership witness of any value that has not been accumulated. We give a construction f

travail 发表于 2025-3-27 16:10:41

http://reply.papertrans.cn/16/1598/159734/159734_35.png

替代品 发表于 2025-3-27 18:16:28

http://reply.papertrans.cn/16/1598/159734/159734_36.png

GEAR 发表于 2025-3-28 00:19:13

http://reply.papertrans.cn/16/1598/159734/159734_37.png

含糊其辞 发表于 2025-3-28 02:38:11

http://reply.papertrans.cn/16/1598/159734/159734_38.png

Robust 发表于 2025-3-28 08:07:36

http://reply.papertrans.cn/16/1598/159734/159734_39.png

善于 发表于 2025-3-28 14:06:35

http://reply.papertrans.cn/16/1598/159734/159734_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Applied Cryptography and Network Security; 5th International Co Jonathan Katz,Moti Yung Conference proceedings 2007 Springer-Verlag Berlin