Musket 发表于 2025-4-1 02:52:07

http://reply.papertrans.cn/16/1598/159734/159734_61.png

SEEK 发表于 2025-4-1 09:21:42

Privacy-Preserving Set Unionems that are in at least one participant’s set without learning the frequency of the items or which participant(s) contributed specific items. To our knowledge our protocol is the most efficient privacy-preserving set union protocol for the malicious adversary model to date.

Ccu106 发表于 2025-4-1 10:43:27

Identity-Based Proxy Re-encryptionhe IBE trusted-party key generator. In addition, they are non-interactive and one of them permits multiple re-encryptions. Their security is based on a standard assumption (DBDH) in the random oracle model.

Palliation 发表于 2025-4-1 16:00:02

http://reply.papertrans.cn/16/1598/159734/159734_64.png

窗帘等 发表于 2025-4-1 20:57:57

http://reply.papertrans.cn/16/1598/159734/159734_65.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Applied Cryptography and Network Security; 5th International Co Jonathan Katz,Moti Yung Conference proceedings 2007 Springer-Verlag Berlin