Musket
发表于 2025-4-1 02:52:07
http://reply.papertrans.cn/16/1598/159734/159734_61.png
SEEK
发表于 2025-4-1 09:21:42
Privacy-Preserving Set Unionems that are in at least one participant’s set without learning the frequency of the items or which participant(s) contributed specific items. To our knowledge our protocol is the most efficient privacy-preserving set union protocol for the malicious adversary model to date.
Ccu106
发表于 2025-4-1 10:43:27
Identity-Based Proxy Re-encryptionhe IBE trusted-party key generator. In addition, they are non-interactive and one of them permits multiple re-encryptions. Their security is based on a standard assumption (DBDH) in the random oracle model.
Palliation
发表于 2025-4-1 16:00:02
http://reply.papertrans.cn/16/1598/159734/159734_64.png
窗帘等
发表于 2025-4-1 20:57:57
http://reply.papertrans.cn/16/1598/159734/159734_65.png