该得 发表于 2025-3-26 23:17:46
Zero-Knowledge Age Restriction for GNU Talerresented as an extension of a privacy-friendly payment protocol with a zero-knowledge scheme that cryprographically augments coins for this purpose. Our scheme enables buyers to prove to be of sufficient age for a particular transaction without disclosing it. Our modification preserves the privacy a难听的声音 发表于 2025-3-27 04:33:40
http://reply.papertrans.cn/24/2339/233870/233870_32.pngbarium-study 发表于 2025-3-27 06:16:15
http://reply.papertrans.cn/24/2339/233870/233870_33.png闲逛 发表于 2025-3-27 10:58:29
One Vote Is Enough for Analysing Privacyensuring the security of the cryptographic protocols used in e-voting is of paramount importance. However, the security analysis of this type of protocols raises a number of challenges, and they are often out of reach of existing verification tools..In this paper, we study ., a central security propMAG 发表于 2025-3-27 14:23:18
http://reply.papertrans.cn/24/2339/233870/233870_35.pnguveitis 发表于 2025-3-27 19:32:36
XSPIR: Efficient Symmetrically Private Information Retrieval from Ring-LWEas been retrieved. Symmetrically Private Information Retrieval (SPIR) additionally protects the privacy of the data, requiring that the client obtains only its desired entry, and no information on other data entries..In recent years, considerable effort has been expanded towards making PIR practicalOffstage 发表于 2025-3-28 01:41:48
Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemicorldwide to fight the COVID-19 pandemic spread via contact tracing. Among these systems, many rely on the BLE based Google-Apple Exposure Notification (GAEN) API (for iPhones and Android systems)..We assert that it is now the time to investigate how to deal with scale issues, assuming the next pandeprosperity 发表于 2025-3-28 03:42:57
http://reply.papertrans.cn/24/2339/233870/233870_38.pngimmunity 发表于 2025-3-28 09:35:40
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and Moreince its introduction, SE has been shown as a versatile and elegant tool for implementing many other important primitives such as (Hierarchical) Identity-based Encryption ((H)IBE), Broadcast (H)IBE, Attribute-based Encryption, and Forward-secure cryptosystems..This paper revisits SE toward a more co谈判 发表于 2025-3-28 10:24:50
Public Key Authenticated Encryption with Keyword Search from LWEl. proposed the public key authenticated encryption with keyword search (PAEKS), where the sender not only encrypts a keyword, but also authenticates it. To further resist against quantum attacks, Liu et al. proposed a generic construction of PAEKS and the first quantum-resistant PAEKS instantiation