借喻 发表于 2025-3-28 18:34:43

Conference proceedings 2015s. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

TOXIN 发表于 2025-3-28 18:48:43

http://reply.papertrans.cn/47/4654/465355/465355_42.png

咒语 发表于 2025-3-29 02:23:35

An Efficient Privacy-Preserving E-coupon Systemnonymity/unlinkability. However, achieving both traceability against dishonest users and anonymity for honest users without involving any third party is an open problem that has not been solved by the previous work. Another desirable feature of an e-coupon system that has not been studied in the lit

MOTIF 发表于 2025-3-29 03:34:24

http://reply.papertrans.cn/47/4654/465355/465355_44.png

小故事 发表于 2025-3-29 10:51:33

http://reply.papertrans.cn/47/4654/465355/465355_45.png

使出神 发表于 2025-3-29 13:20:52

http://reply.papertrans.cn/47/4654/465355/465355_46.png

注意 发表于 2025-3-29 17:25:37

Private Aggregation with Custom Collusion Toleranceheless, many applications need this functionality, while others need it for simpler computations; operations such as multiplication or addition might be sufficient. In this work we extend the well-known multiparty computation protocol (MPC) for summation of Kurswave . More precisely, we introduce tw

蘑菇 发表于 2025-3-29 21:05:59

http://reply.papertrans.cn/47/4654/465355/465355_48.png

Adrenal-Glands 发表于 2025-3-30 03:27:33

http://reply.papertrans.cn/47/4654/465355/465355_49.png

Resign 发表于 2025-3-30 06:27:08

Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledgeknown that Barak’s non-black-box ZK , which can be adapted to a ZKAOK, is the first one achieving constant-round, public-coin and strict-polynomial-time simulation properties, and admitting a 6-round implementation shown by Ostrovsky and Visconti . This achieves the best exact roun
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security and Cryptology; 10th International C Dongdai Lin,Moti Yung,Jianying Zhou Conference proceedings 2015 Springer Internat