Musket 发表于 2025-4-1 02:52:07
http://reply.papertrans.cn/16/1598/159734/159734_61.pngSEEK 发表于 2025-4-1 09:21:42
Privacy-Preserving Set Unionems that are in at least one participant’s set without learning the frequency of the items or which participant(s) contributed specific items. To our knowledge our protocol is the most efficient privacy-preserving set union protocol for the malicious adversary model to date.Ccu106 发表于 2025-4-1 10:43:27
Identity-Based Proxy Re-encryptionhe IBE trusted-party key generator. In addition, they are non-interactive and one of them permits multiple re-encryptions. Their security is based on a standard assumption (DBDH) in the random oracle model.Palliation 发表于 2025-4-1 16:00:02
http://reply.papertrans.cn/16/1598/159734/159734_64.png窗帘等 发表于 2025-4-1 20:57:57
http://reply.papertrans.cn/16/1598/159734/159734_65.png