ABYSS 发表于 2025-3-28 16:39:09
http://reply.papertrans.cn/47/4653/465296/465296_41.png安定 发表于 2025-3-28 19:29:38
http://reply.papertrans.cn/47/4653/465296/465296_42.png官僚统治 发表于 2025-3-29 00:11:41
A Secure and Self-tallying E-voting System Based on Blockchainers for ballot security and these random numbers will be cancelled out when multiplying all ballots to allow counting the ballots. Secondly, we adopt non-interactive zero knowledge proof to make sure these ballots are valid. Our scheme is proved to be secure.帐单 发表于 2025-3-29 05:26:44
Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with per proposes a new zero-knowledge protocol to support provers to convince verifiers, that attributes used for creating the signature are valid and have naive tokens. Moreover, this paper offers a new Attribute-Based Group Signature (ABGS) scheme, that uses the proposed protocol and achieves full anonymity.tattle 发表于 2025-3-29 07:49:52
Strengthened PAKE Protocols Secure Against Malicious Private Key Generatorersonating the server. Then, we propose two strengthened PAKE (. and .) protocols that prevents such malicious PKG’s passive/active attacks. Also, we discuss security of the . and . protocols, and compare relevant protocols in terms of efficiency and security.易受刺激 发表于 2025-3-29 12:02:01
http://reply.papertrans.cn/47/4653/465296/465296_46.png可互换 发表于 2025-3-29 19:24:10
0302-9743 ckchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues..978-3-030-39302-1978-3-030-39303-8Series ISSN 0302-9743 Series E-ISSN 1611-3349背景 发表于 2025-3-29 21:06:37
http://reply.papertrans.cn/47/4653/465296/465296_48.pnguncertain 发表于 2025-3-30 02:52:05
Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessingg before data embedding. Compared with the state-of-the-art methods, higher embedding capacity can be obtained with the proposed method while the original or processed image can be correctly generated.里程碑 发表于 2025-3-30 05:19:54
Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regressionng 4-fold cross validation, 4 different estimates of our model’s errors are calculated. And then we use bias and variance extracted from these errors to find the best model. We perform an experiment on a dataset extracted from Kaggle and show that our approach can homomorphically regress a given encrypted data without decrypting it.