Psa617 发表于 2025-3-25 04:50:00
http://reply.papertrans.cn/47/4653/465271/465271_21.pnglanguor 发表于 2025-3-25 11:23:34
http://reply.papertrans.cn/47/4653/465271/465271_22.pngmaculated 发表于 2025-3-25 11:58:56
Daric: A Storage Efficient Payment Channel with Punishment Mechanismoptimal storage and bounded closure. Moreover, Daric implements a punishment mechanism and simultaneously avoids the methods other schemes commonly use to enable punishment: 1) state duplication which leads to exponential increase in the number of transactions with the number of applications on top纹章 发表于 2025-3-25 17:54:37
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMsly. ORAM is a good potential approach to carry out this kind of remote operation. In order to use ORAM for this purpose, we still need to have garbled programs to run on ORAM. Goldwasser et al. and Lu-Ostrovsky initiated the study of garbled RAM machines in their 2013 Crypto papers. Goldwasser et al绕着哥哥问 发表于 2025-3-25 20:12:00
Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Settingcompute the cardinality of the intersection without leaking anything more to the other party. It’s one of the best-studied applications of secure computation, and many PSI-CA protocols in balanced or unbalanced scenarios have been proposed. Generally, unbalanced scenario means that the private set sIsolate 发表于 2025-3-26 01:22:32
http://reply.papertrans.cn/47/4653/465271/465271_26.png损坏 发表于 2025-3-26 04:52:01
Witness Encryption from Smooth Projective Hashing Systemhic primitives. The former can produce a hash value corresponding to an . language instance in two ways, and the latter allows encrypting a message using the description of an instance in an . language. Mostly, witness encryption is constructed using computationally expensive tools like multilinear有毒 发表于 2025-3-26 10:05:05
More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Modelther two ciphertexts are encryption of the same plaintext. Although several lattice-based IBEET schemes have been proposed, they have drawbacks in either security or efficiency. Specifically, most schemes satisfy only selective security, while adaptively secure schemes in the standard model suffer frefraction 发表于 2025-3-26 14:45:21
http://reply.papertrans.cn/47/4653/465271/465271_29.pngdefile 发表于 2025-3-26 18:23:24
http://reply.papertrans.cn/47/4653/465271/465271_30.png