大火 发表于 2025-3-23 13:45:58
Converting PKI-Based Authenticated Key Exchange to Identity-Based, communication and computation, the scheme is not secure against some advanced exposure attacks. In this paper, we achieve exposure-resilient ID-AKE schemes without pairings. Specifically, we introduce two . generic conversions from ordinary PKI-based AKE (PKI-AKE) to ID-AKE (i.e., exposure resilien色情 发表于 2025-3-23 17:24:33
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi a semi-honest sender. To achieve this we are the first to combine a machine-assisted proof of correctness with advanced cryptographic primitives to prove security properties of Java code. The machine-assisted part of the proof is conducted with KeY, an interactive theorem prover..The proof includesconvulsion 发表于 2025-3-23 19:12:32
http://reply.papertrans.cn/25/2407/240601/240601_13.pngscotoma 发表于 2025-3-24 01:31:17
http://reply.papertrans.cn/25/2407/240601/240601_14.png边缘带来墨水 发表于 2025-3-24 03:47:54
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers,private information retrieval schemes can be built using locally decodable codes . In this paper, we construct a Byzantine robust PIR scheme using the multiplicity codes introduced by Kopparty . . Our main contributions are on the one hand to avoid full replication of the database on each se拍翅 发表于 2025-3-24 07:00:08
http://reply.papertrans.cn/25/2407/240601/240601_16.pngWITH 发表于 2025-3-24 11:37:04
http://reply.papertrans.cn/25/2407/240601/240601_17.pngAntagonist 发表于 2025-3-24 18:13:27
http://reply.papertrans.cn/25/2407/240601/240601_18.png向下 发表于 2025-3-24 22:36:55
http://reply.papertrans.cn/25/2407/240601/240601_19.pngflourish 发表于 2025-3-25 02:32:24
Cryptology and Network Security978-3-319-12280-9Series ISSN 0302-9743 Series E-ISSN 1611-3349