荒唐 发表于 2025-3-23 11:03:14

http://reply.papertrans.cn/25/2406/240566/240566_11.png

Pde5-Inhibitors 发表于 2025-3-23 17:03:29

Subversion-Resistant Simulation (Knowledge) Sound NIZKs,rove the result, we show that given a NIZK argument that achieves Sub-ZK and (knowledge) soundness, one can use an OR-based construction to define a new language and build a NIZK argument that will guarantee Sub-ZK and . (knowledge) soundness at the same time. We instantiate the construction with th

Banister 发表于 2025-3-23 21:52:20

Efficient Fully Secure Leakage-Deterring Encryption, a CPA-type of privacy for user secrets, which is a very weak guarantee; (3) in their construction which turns any public-key encryption scheme into a leakage-deterring one, the new public keys consist of linearly (in the bit-size of the secrets) many public keys of the original scheme, and the ciph

意见一致 发表于 2025-3-24 01:12:19

Commodity-Based 2PC for Arithmetic Circuits,e triple/OLE is a constant number of field elements (when the field is sufficiently large). We also report on results from an implementation of the OLE protocol. Finally, we suggest an approach to practical realization of a commodity based system where servers need no memory and can be accessed asyn

Blood-Vessels 发表于 2025-3-24 04:52:41

http://reply.papertrans.cn/25/2406/240566/240566_15.png

指令 发表于 2025-3-24 07:00:16

http://reply.papertrans.cn/25/2406/240566/240566_16.png

Minatory 发表于 2025-3-24 11:34:57

Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes,tz-Lindell scheme meets the quantum security. Regarding SAMACs, since the existing schemes are insecure, we newly present two generic constructions: One is constructed from quantum pseudorandom functions, and the other is constructed from randomized pseudorandom generators and (classical) pseudorand

难理解 发表于 2025-3-24 17:13:48

http://reply.papertrans.cn/25/2406/240566/240566_18.png

过滤 发表于 2025-3-24 20:58:57

A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange,ass of key exchange (KE) where only one message is sent from each party to the other. Our contributions can be summarized as follows:.Examples are presented using the classical Diffie-Hellman KE, RLWE-based KE and Supersingular Isogeny Diffie-Hellman KE.

表状态 发表于 2025-3-25 02:16:08

http://reply.papertrans.cn/25/2406/240566/240566_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Cryptography and Coding; 17th IMA Internation Martin Albrecht Conference proceedings 2019 Springer Nature Switzerland AG 2019 authenticatio