令人不快 发表于 2025-3-25 06:33:08

http://reply.papertrans.cn/47/4653/465257/465257_21.png

noxious 发表于 2025-3-25 10:05:53

Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation and certificate revocation services, although very costly in practice, must be available, to prevent big loss due to compromising of the signing key. In , a new concept called . was proposed to get rid of trusted time-stamping and certificate revocation services and a concrete scheme was presen

极肥胖 发表于 2025-3-25 12:12:46

http://reply.papertrans.cn/47/4653/465257/465257_23.png

赦免 发表于 2025-3-25 18:04:21

http://reply.papertrans.cn/47/4653/465257/465257_24.png

恃强凌弱 发表于 2025-3-25 20:29:48

http://reply.papertrans.cn/47/4653/465257/465257_25.png

Cabg318 发表于 2025-3-26 04:04:31

Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computationspropose very efficient protocols for implementing addition and multiplication over .(.). Differently than in previous works, in our protocol each step of the computation is verifiable. Moreover, no copying of commitments is necessary, because commitments are not destroyed during the computation. Als

olfction 发表于 2025-3-26 04:29:22

The Design and Implementation of Protocol-Based Hidden Key Recovery the following novel features: (1) The Key recovery channels are “unfilterable” — the key recovery channels cannot be removed without also breaking correct operation of the protocol. (2) Protocol implementations containing our key recovery designs can inter-operate with standard (uncompromised) prot

祖传财产 发表于 2025-3-26 10:03:31

http://reply.papertrans.cn/47/4653/465257/465257_28.png

BILL 发表于 2025-3-26 12:46:05

On the Security of Fair Non-repudiation Protocolsled by several inherent design weaknesses, which also apply to other non-repudiation protocols. To prevent these attacks, we propose generic countermeasures that considerably strengthen the design and implementation of non-repudiation protocols. The application of these countermeasures is finally sh

不规则 发表于 2025-3-26 17:08:17

http://reply.papertrans.cn/47/4653/465257/465257_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security; 6th International Co Colin Boyd,Wenbo Mao Conference proceedings 2003 Springer-Verlag Berlin Heidelberg 2003 PKI infr