该得 发表于 2025-3-26 23:17:46

Zero-Knowledge Age Restriction for GNU Talerresented as an extension of a privacy-friendly payment protocol with a zero-knowledge scheme that cryprographically augments coins for this purpose. Our scheme enables buyers to prove to be of sufficient age for a particular transaction without disclosing it. Our modification preserves the privacy a

难听的声音 发表于 2025-3-27 04:33:40

http://reply.papertrans.cn/24/2339/233870/233870_32.png

barium-study 发表于 2025-3-27 06:16:15

http://reply.papertrans.cn/24/2339/233870/233870_33.png

闲逛 发表于 2025-3-27 10:58:29

One Vote Is Enough for Analysing Privacyensuring the security of the cryptographic protocols used in e-voting is of paramount importance. However, the security analysis of this type of protocols raises a number of challenges, and they are often out of reach of existing verification tools..In this paper, we study ., a central security prop

MAG 发表于 2025-3-27 14:23:18

http://reply.papertrans.cn/24/2339/233870/233870_35.png

uveitis 发表于 2025-3-27 19:32:36

XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWEas been retrieved. Symmetrically Private Information Retrieval (SPIR) additionally protects the privacy of the data, requiring that the client obtains only its desired entry, and no information on other data entries..In recent years, considerable effort has been expanded towards making PIR practical

Offstage 发表于 2025-3-28 01:41:48

Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemicorldwide to fight the COVID-19 pandemic spread via contact tracing. Among these systems, many rely on the BLE based Google-Apple Exposure Notification (GAEN) API (for iPhones and Android systems)..We assert that it is now the time to investigate how to deal with scale issues, assuming the next pande

prosperity 发表于 2025-3-28 03:42:57

http://reply.papertrans.cn/24/2339/233870/233870_38.png

immunity 发表于 2025-3-28 09:35:40

Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and Moreince its introduction, SE has been shown as a versatile and elegant tool for implementing many other important primitives such as (Hierarchical) Identity-based Encryption ((H)IBE), Broadcast (H)IBE, Attribute-based Encryption, and Forward-secure cryptosystems..This paper revisits SE toward a more co

谈判 发表于 2025-3-28 10:24:50

Public Key Authenticated Encryption with Keyword Search from LWEl. proposed the public key authenticated encryption with keyword search (PAEKS), where the sender not only encrypts a keyword, but also authenticates it. To further resist against quantum attacks, Liu et al. proposed a generic construction of PAEKS and the first quantum-resistant PAEKS instantiation
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Computer Security – ESORICS 2022; 27th European Sympos Vijayalakshmi Atluri,Roberto Di Pietro,Weizhi Meng Conference proceedings 2022 The E