借喻 发表于 2025-3-28 18:34:43
Conference proceedings 2015s. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.TOXIN 发表于 2025-3-28 18:48:43
http://reply.papertrans.cn/47/4654/465355/465355_42.png咒语 发表于 2025-3-29 02:23:35
An Efficient Privacy-Preserving E-coupon Systemnonymity/unlinkability. However, achieving both traceability against dishonest users and anonymity for honest users without involving any third party is an open problem that has not been solved by the previous work. Another desirable feature of an e-coupon system that has not been studied in the litMOTIF 发表于 2025-3-29 03:34:24
http://reply.papertrans.cn/47/4654/465355/465355_44.png小故事 发表于 2025-3-29 10:51:33
http://reply.papertrans.cn/47/4654/465355/465355_45.png使出神 发表于 2025-3-29 13:20:52
http://reply.papertrans.cn/47/4654/465355/465355_46.png注意 发表于 2025-3-29 17:25:37
Private Aggregation with Custom Collusion Toleranceheless, many applications need this functionality, while others need it for simpler computations; operations such as multiplication or addition might be sufficient. In this work we extend the well-known multiparty computation protocol (MPC) for summation of Kurswave . More precisely, we introduce tw蘑菇 发表于 2025-3-29 21:05:59
http://reply.papertrans.cn/47/4654/465355/465355_48.pngAdrenal-Glands 发表于 2025-3-30 03:27:33
http://reply.papertrans.cn/47/4654/465355/465355_49.pngResign 发表于 2025-3-30 06:27:08
Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledgeknown that Barak’s non-black-box ZK , which can be adapted to a ZKAOK, is the first one achieving constant-round, public-coin and strict-polynomial-time simulation properties, and admitting a 6-round implementation shown by Ostrovsky and Visconti . This achieves the best exact roun