项目 发表于 2025-3-23 13:17:36

Limits of Black-Box Anamorphic Encryptionre secret decryption keys are under the control of a dictator. The challenge here is to be able to establish a secret communication channel to exchange covert (i.e. anamorphic) messages on top of some already deployed public key encryption scheme..Over the last few years several works addressed this

极大的痛苦 发表于 2025-3-23 17:51:58

http://reply.papertrans.cn/17/1673/167244/167244_12.png

雪上轻舟飞过 发表于 2025-3-23 18:08:12

Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyondt the receiver’s private key and even dictates messages to the sender, cannot prevent the receiver from getting an additional covert anamorphic message from a sender. The model required an initial private collaboration to share some secret. There may be settings though where an initial collaboration

娘娘腔 发表于 2025-3-23 23:00:15

http://reply.papertrans.cn/17/1673/167244/167244_14.png

BUMP 发表于 2025-3-24 05:47:30

http://reply.papertrans.cn/17/1673/167244/167244_15.png

Extricate 发表于 2025-3-24 06:35:05

,Zur Pluralität und Methodenvielfalt, .-SUM and its variant .-XOR, especially their . versions, where a random solution is planted in a randomly generated instance and has to be recovered. We provide evidence for the hardness of these problems and show applications to constructing public-key encryption schemes. Our contributions are summarized below.

削减 发表于 2025-3-24 13:18:58

https://doi.org/10.1007/978-3-642-53313-6. Remarkably, our design requires only a single challenge, irrespective of the number of files, ensuring both prover’s and verifier’s run-times remain manageable even as file counts soar. Our approach introduces a paradigm shift in PoRep designs, offering a blueprint for highly scalable and efficient decentralized storage solutions.

candle 发表于 2025-3-24 16:31:10

,Zur Pluralität und Methodenvielfalt,y small constant multiplicative loss in LWE error size. For the proof, we make use of techniques by Genise, Micciancio, Peikert and Walter to analyze marginal and conditional distributions of sums of discrete Gaussians.

动物 发表于 2025-3-24 19:50:38

Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynom. Remarkably, our design requires only a single challenge, irrespective of the number of files, ensuring both prover’s and verifier’s run-times remain manageable even as file counts soar. Our approach introduces a paradigm shift in PoRep designs, offering a blueprint for highly scalable and efficient decentralized storage solutions.

Conflict 发表于 2025-3-24 23:49:38

http://reply.papertrans.cn/17/1673/167244/167244_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Advances in Cryptology – CRYPTO 2024; 44th Annual Internat Leonid Reyzin,Douglas Stebila Conference proceedings 2024 International Associat