Psa617 发表于 2025-3-25 04:50:00

http://reply.papertrans.cn/47/4653/465271/465271_21.png

languor 发表于 2025-3-25 11:23:34

http://reply.papertrans.cn/47/4653/465271/465271_22.png

maculated 发表于 2025-3-25 11:58:56

Daric: A Storage Efficient Payment Channel with Punishment Mechanismoptimal storage and bounded closure. Moreover, Daric implements a punishment mechanism and simultaneously avoids the methods other schemes commonly use to enable punishment: 1) state duplication which leads to exponential increase in the number of transactions with the number of applications on top

纹章 发表于 2025-3-25 17:54:37

Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMsly. ORAM is a good potential approach to carry out this kind of remote operation. In order to use ORAM for this purpose, we still need to have garbled programs to run on ORAM. Goldwasser et al. and Lu-Ostrovsky initiated the study of garbled RAM machines in their 2013 Crypto papers. Goldwasser et al

绕着哥哥问 发表于 2025-3-25 20:12:00

Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Settingcompute the cardinality of the intersection without leaking anything more to the other party. It’s one of the best-studied applications of secure computation, and many PSI-CA protocols in balanced or unbalanced scenarios have been proposed. Generally, unbalanced scenario means that the private set s

Isolate 发表于 2025-3-26 01:22:32

http://reply.papertrans.cn/47/4653/465271/465271_26.png

损坏 发表于 2025-3-26 04:52:01

Witness Encryption from Smooth Projective Hashing Systemhic primitives. The former can produce a hash value corresponding to an . language instance in two ways, and the latter allows encrypting a message using the description of an instance in an . language. Mostly, witness encryption is constructed using computationally expensive tools like multilinear

有毒 发表于 2025-3-26 10:05:05

More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Modelther two ciphertexts are encryption of the same plaintext. Although several lattice-based IBEET schemes have been proposed, they have drawbacks in either security or efficiency. Specifically, most schemes satisfy only selective security, while adaptively secure schemes in the standard model suffer f

refraction 发表于 2025-3-26 14:45:21

http://reply.papertrans.cn/47/4653/465271/465271_29.png

defile 发表于 2025-3-26 18:23:24

http://reply.papertrans.cn/47/4653/465271/465271_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Security; 25th International C Willy Susilo,Xiaofeng Chen,Rolly Intan Conference proceedings 2022 The Editor(s) (if applicable)