承认 发表于 2025-3-25 06:50:40
Self-correctors for Cryptographic Modules. For a practical demonstration of the method, we also present examples of self-correctors for the decryption functions of public-key cryptosystems, such as the ElGamal, the Pailler, and the GHV cryptosystems, and for hidden pairings with trapdoors.傻 发表于 2025-3-25 11:29:51
http://reply.papertrans.cn/25/2406/240567/240567_22.png翻布寻找 发表于 2025-3-25 11:47:42
http://reply.papertrans.cn/25/2406/240567/240567_23.png神刊 发表于 2025-3-25 17:40:04
Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Constructiond from the oblivious transfer by Ding et al. meets the bound with equality. We also give a simple and optimal construction of the bit commitment in this paper. We emphasize that our construction is simpler and easier to implement than already known any other bit commitment in the BSM.Cardioplegia 发表于 2025-3-25 23:37:18
http://reply.papertrans.cn/25/2406/240567/240567_25.pngInfelicity 发表于 2025-3-26 03:23:05
http://reply.papertrans.cn/25/2406/240567/240567_26.png喧闹 发表于 2025-3-26 04:23:48
http://reply.papertrans.cn/25/2406/240567/240567_27.png谁在削木头 发表于 2025-3-26 11:53:53
http://reply.papertrans.cn/25/2406/240567/240567_28.pngCommentary 发表于 2025-3-26 15:04:30
http://reply.papertrans.cn/25/2406/240567/240567_29.pngenlist 发表于 2025-3-26 17:03:31
http://reply.papertrans.cn/25/2406/240567/240567_30.png