BANAL 发表于 2025-3-25 19:37:08

Verifiable Pairing and Its Applicationsious proposal in . As a bonus result, we find that our scheme for verifiable pairing gives rise to a new identity-based signature that is provably secure in the random oracle model without using the forking lemma, assuming the hardness of the computational bilinear Diffie-Hellman problem.

monochromatic 发表于 2025-3-25 20:20:21

http://reply.papertrans.cn/47/4653/465286/465286_25.png

复习 发表于 2025-3-26 02:12:02

Information Security Applications978-3-540-31815-6Series ISSN 0302-9743 Series E-ISSN 1611-3349

载货清单 发表于 2025-3-26 04:50:24

http://reply.papertrans.cn/47/4653/465286/465286_27.png

Cytokines 发表于 2025-3-26 09:27:20

http://reply.papertrans.cn/47/4653/465286/465286_28.png

咒语 发表于 2025-3-26 14:04:22

Chae Hoon Lim,Moti YungIncludes supplementary material:

落叶剂 发表于 2025-3-26 18:24:58

http://reply.papertrans.cn/47/4653/465286/465286_30.png

ALE 发表于 2025-3-26 21:34:19

Proving Key UsageIn the context of a validation server, or more general PKI server, it could be interesting to give the server the possibility to check whether a certain public key was used. We investigate here some possibilities. We also present an escrow system as an application of the technology.

暂停,间歇 发表于 2025-3-27 02:28:12

http://reply.papertrans.cn/47/4653/465286/465286_32.png

Legend 发表于 2025-3-27 08:28:30

Application of Content Computing in Honeyfarmore, CDN also redirect clients in a centralized way which will induce latency in content delivery. This paper describes the ways to improve CDN to make it suitable to use as a routing mechanism for honeyfarm.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security Applications; 5th International Wo Chae Hoon Lim,Moti Yung Conference proceedings 2005 Springer-Verlag Berlin Heidelbe