falsehood 发表于 2025-3-23 12:06:06

http://reply.papertrans.cn/17/1673/167239/167239_11.png

让空气进入 发表于 2025-3-23 15:55:35

Fully Malicious Authenticated PIRe do so by introducing ., which, from the server’s perspective, are computationally indistinguishable from regular PIR queries. Provided that the server succeeds in correctly answering . such validation queries, the client is convinced with probability . that the server is unable to break privacy wi

同步信息 发表于 2025-3-23 19:15:29

http://reply.papertrans.cn/17/1673/167239/167239_13.png

情节剧 发表于 2025-3-24 01:28:41

http://reply.papertrans.cn/17/1673/167239/167239_14.png

landmark 发表于 2025-3-24 05:08:47

http://reply.papertrans.cn/17/1673/167239/167239_15.png

Gnrh670 发表于 2025-3-24 10:21:42

http://reply.papertrans.cn/17/1673/167239/167239_16.png

glisten 发表于 2025-3-24 11:01:02

More Efficient Zero-Knowledge Protocols over , via Galois Ringsfraction of units in . is 1/2. In this work, we first construct ZK protocols over a high degree Galois ring extension of . (fraction of units close to 1) and then convert them to . efficiently using amortization techniques. Our results greatly change the landscape of ZK protocols over ..

消瘦 发表于 2025-3-24 17:12:20

http://reply.papertrans.cn/17/1673/167239/167239_18.png

蛤肉 发表于 2025-3-24 19:28:15

0302-9743 y computation;..Part IX: Multiparty computation; private information retrieval; zero-knowledge;..Part X: Succinct arguments... .978-3-031-68399-2978-3-031-68400-5Series ISSN 0302-9743 Series E-ISSN 1611-3349

强制性 发表于 2025-3-25 02:07:35

Conference proceedings 2024VI: Cryptanalysis; new primitives; side-channels and leakage;..Part VII: Quantum cryptography; threshold cryptography;..Part VIII: Multiparty computation;..Part IX: Multiparty computation; private information retrieval; zero-knowledge;..Part X: Succinct arguments... .
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Advances in Cryptology – CRYPTO 2024; 44th Annual Internat Leonid Reyzin,Douglas Stebila Conference proceedings 2024 International Associat