承认
发表于 2025-3-25 06:50:40
Self-correctors for Cryptographic Modules. For a practical demonstration of the method, we also present examples of self-correctors for the decryption functions of public-key cryptosystems, such as the ElGamal, the Pailler, and the GHV cryptosystems, and for hidden pairings with trapdoors.
傻
发表于 2025-3-25 11:29:51
http://reply.papertrans.cn/25/2406/240567/240567_22.png
翻布寻找
发表于 2025-3-25 11:47:42
http://reply.papertrans.cn/25/2406/240567/240567_23.png
神刊
发表于 2025-3-25 17:40:04
Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Constructiond from the oblivious transfer by Ding et al. meets the bound with equality. We also give a simple and optimal construction of the bit commitment in this paper. We emphasize that our construction is simpler and easier to implement than already known any other bit commitment in the BSM.
Cardioplegia
发表于 2025-3-25 23:37:18
http://reply.papertrans.cn/25/2406/240567/240567_25.png
Infelicity
发表于 2025-3-26 03:23:05
http://reply.papertrans.cn/25/2406/240567/240567_26.png
喧闹
发表于 2025-3-26 04:23:48
http://reply.papertrans.cn/25/2406/240567/240567_27.png
谁在削木头
发表于 2025-3-26 11:53:53
http://reply.papertrans.cn/25/2406/240567/240567_28.png
Commentary
发表于 2025-3-26 15:04:30
http://reply.papertrans.cn/25/2406/240567/240567_29.png
enlist
发表于 2025-3-26 17:03:31
http://reply.papertrans.cn/25/2406/240567/240567_30.png