收养 发表于 2025-3-30 12:04:10

Protean Signature Schemesages by a semi-trusted third party simultaneously. In existing work, one is either allowed to remove or edit parts of signed messages, but not both at the same time. Which and how parts of the signed messages can be modified is chosen by the signer. Thus, our new primitive generalizes both redactabl

矛盾 发表于 2025-3-30 13:05:36

Code-Based Signature Schemes from Identification Protocols in the Rank Metricameters. The proposals are derived from their analogue in the Hamming metric. We discuss their security in the post-quantum scenario. With respect to other signature schemes based on codes, our constructions maintain a similar efficiency, possess large but still practical signatures, and the smalles

富足女人 发表于 2025-3-30 17:32:50

http://reply.papertrans.cn/25/2406/240596/240596_53.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Cryptology and Network Security; 17th International C Jan Camenisch,Panos Papadimitratos Conference proceedings 2018 Springer Nature Switze