香料 发表于 2025-3-26 21:59:42
Hashing into Twisted Jacobi Intersection Curvess to construct such encodings: (1) utilizing the algorithm of computing cube roots on . when .; (2) using Shallue-Woestijne-Ulas algorithm when .. In both cases, our encoding methods are more efficient than existed ones. Moreover, we estimate the density of images of both encodings by Chebotarev theorem.ENDOW 发表于 2025-3-27 03:39:35
http://reply.papertrans.cn/47/4654/465361/465361_32.pngVldl379 发表于 2025-3-27 08:02:35
http://reply.papertrans.cn/47/4654/465361/465361_33.png幼稚 发表于 2025-3-27 12:52:11
http://reply.papertrans.cn/47/4654/465361/465361_34.pngengagement 发表于 2025-3-27 13:51:56
A Simpler Bitcoin Voting Protocoldidates. We also redesign a vote casting protocol without threshold signatures to reduce transaction numbers and protocol complexities. We also introduce new polices to make the Bitcoin Voting protocol more fair.SYN 发表于 2025-3-27 18:07:49
A Universal Designated Multi-Verifier Transitive Signature Scheme(.) scheme. Namely, our new scheme allows a transitive signature holder to designate the signature to multi-verifier. Furthermore, for the proposed scheme, we formalize its security notions and prove its security in the random oracle model. We also analyse the performance of our scheme to demonstrate its efficiency.BUOY 发表于 2025-3-27 23:21:26
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Schemey in the security model. Furthermore, we propose an improved strongly unforgeable IBS scheme without random oracles. Compared with other strongly unforgeable IBS schemes in the standard model, our scheme is more efficient in terms of computation cost and signature size.果仁 发表于 2025-3-28 03:05:02
0302-9743 ryptology, Inscrypt 2017, held in Xi‘an, China, in November 2017..The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digitaStricture 发表于 2025-3-28 09:07:20
From Attack on Feige-Shamir to Construction of Oblivious Transfer adversary breaking the .-distributional concurrent zero knowledge of Feige-Shamir protocols over a hard distribution, it can be transformed to an (infinitely-often) distributional witness encryption based on injective one way function.同义联想法 发表于 2025-3-28 12:13:23
Security and Privacy in the IoTn different application domains. We then discuss aspects of a roadmap for IoT security and privacy with focus on access control, software and firmware, and intrusion detection systems. We conclude the paper by outlining a few challenges.