软膏 发表于 2025-3-28 18:30:44

http://reply.papertrans.cn/24/2339/233840/233840_41.png

discord 发表于 2025-3-28 20:01:08

http://reply.papertrans.cn/24/2339/233840/233840_42.png

预兆好 发表于 2025-3-29 02:40:29

Verifiably Encrypted Signatures: Security Revisited and a New Constructionlence class, and a signature commits to the equivalence class: anybody can transfer the signature to a new, scaled, representative..In this work, we give the first black-box construction of a public-key encryption scheme from any SPS-EQ-. satisfying a simple new property which we call perfect compos

charisma 发表于 2025-3-29 04:07:56

http://reply.papertrans.cn/24/2339/233840/233840_44.png

歹徒 发表于 2025-3-29 10:07:28

http://reply.papertrans.cn/24/2339/233840/233840_45.png

从属 发表于 2025-3-29 11:55:27

Symmetric-Key Based Proofs of Retrievability Supporting Public Verificationver possesses all of his data in the future. During an audit, the server must maintain full knowledge of the client’s data to pass, even though only a few blocks of the data need to be accessed. Since the first work by Juels and Kaliski, many PoR schemes have been proposed and some of them can suppo

滋养 发表于 2025-3-29 17:12:22

http://reply.papertrans.cn/24/2339/233840/233840_47.png

商谈 发表于 2025-3-29 21:43:28

Short Accountable Ring Signatures Based on DDHal users to anonymously sign messages on behalf of a group of users. In ring signatures, the group, i.e. the ring, is chosen in an ad hoc manner by the signer. In group signatures, group membership is controlled by a group manager. Group signatures additionally enforce accountability by providing th

Melanoma 发表于 2025-3-30 01:03:26

http://reply.papertrans.cn/24/2339/233840/233840_49.png

厚脸皮 发表于 2025-3-30 05:19:38

Server-Aided Revocable Identity-Based Encryptione literature. Among them, the tree-based revocation approach, due to Boldyreva, Goyal and Kumar, is probably the most efficient one. In this approach, a trusted Key Generation Center (KGC) periodically broadcasts a set of key updates to all (non-revoked) users through public channels, where the size
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Computer Security -- ESORICS 2015; 20th European Sympos Günther Pernul,Peter Y A Ryan,Edgar Weippl Conference proceedings 2015 Springer Int