承认 发表于 2025-3-25 06:50:40

Self-correctors for Cryptographic Modules. For a practical demonstration of the method, we also present examples of self-correctors for the decryption functions of public-key cryptosystems, such as the ElGamal, the Pailler, and the GHV cryptosystems, and for hidden pairings with trapdoors.

发表于 2025-3-25 11:29:51

http://reply.papertrans.cn/25/2406/240567/240567_22.png

翻布寻找 发表于 2025-3-25 11:47:42

http://reply.papertrans.cn/25/2406/240567/240567_23.png

神刊 发表于 2025-3-25 17:40:04

Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Constructiond from the oblivious transfer by Ding et al. meets the bound with equality. We also give a simple and optimal construction of the bit commitment in this paper. We emphasize that our construction is simpler and easier to implement than already known any other bit commitment in the BSM.

Cardioplegia 发表于 2025-3-25 23:37:18

http://reply.papertrans.cn/25/2406/240567/240567_25.png

Infelicity 发表于 2025-3-26 03:23:05

http://reply.papertrans.cn/25/2406/240567/240567_26.png

喧闹 发表于 2025-3-26 04:23:48

http://reply.papertrans.cn/25/2406/240567/240567_27.png

谁在削木头 发表于 2025-3-26 11:53:53

http://reply.papertrans.cn/25/2406/240567/240567_28.png

Commentary 发表于 2025-3-26 15:04:30

http://reply.papertrans.cn/25/2406/240567/240567_29.png

enlist 发表于 2025-3-26 17:03:31

http://reply.papertrans.cn/25/2406/240567/240567_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Cryptography and Coding; 13th IMA Internation Liqun Chen Conference proceedings 2011 Springer-Verlag GmbH Berlin Heidelberg 2011 anonymous