荒唐 发表于 2025-3-23 11:03:14
http://reply.papertrans.cn/25/2406/240566/240566_11.pngPde5-Inhibitors 发表于 2025-3-23 17:03:29
Subversion-Resistant Simulation (Knowledge) Sound NIZKs,rove the result, we show that given a NIZK argument that achieves Sub-ZK and (knowledge) soundness, one can use an OR-based construction to define a new language and build a NIZK argument that will guarantee Sub-ZK and . (knowledge) soundness at the same time. We instantiate the construction with thBanister 发表于 2025-3-23 21:52:20
Efficient Fully Secure Leakage-Deterring Encryption, a CPA-type of privacy for user secrets, which is a very weak guarantee; (3) in their construction which turns any public-key encryption scheme into a leakage-deterring one, the new public keys consist of linearly (in the bit-size of the secrets) many public keys of the original scheme, and the ciph意见一致 发表于 2025-3-24 01:12:19
Commodity-Based 2PC for Arithmetic Circuits,e triple/OLE is a constant number of field elements (when the field is sufficiently large). We also report on results from an implementation of the OLE protocol. Finally, we suggest an approach to practical realization of a commodity based system where servers need no memory and can be accessed asynBlood-Vessels 发表于 2025-3-24 04:52:41
http://reply.papertrans.cn/25/2406/240566/240566_15.png指令 发表于 2025-3-24 07:00:16
http://reply.papertrans.cn/25/2406/240566/240566_16.pngMinatory 发表于 2025-3-24 11:34:57
Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes,tz-Lindell scheme meets the quantum security. Regarding SAMACs, since the existing schemes are insecure, we newly present two generic constructions: One is constructed from quantum pseudorandom functions, and the other is constructed from randomized pseudorandom generators and (classical) pseudorand难理解 发表于 2025-3-24 17:13:48
http://reply.papertrans.cn/25/2406/240566/240566_18.png过滤 发表于 2025-3-24 20:58:57
A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange,ass of key exchange (KE) where only one message is sent from each party to the other. Our contributions can be summarized as follows:.Examples are presented using the classical Diffie-Hellman KE, RLWE-based KE and Supersingular Isogeny Diffie-Hellman KE.表状态 发表于 2025-3-25 02:16:08
http://reply.papertrans.cn/25/2406/240566/240566_20.png