擦掉 发表于 2025-3-27 00:25:48

http://reply.papertrans.cn/47/4654/465363/465363_31.png

言外之意 发表于 2025-3-27 02:21:34

http://reply.papertrans.cn/47/4654/465363/465363_32.png

ordain 发表于 2025-3-27 08:36:19

http://reply.papertrans.cn/47/4654/465363/465363_33.png

implore 发表于 2025-3-27 10:00:21

SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programmingre combined by a non-termination prediction algorithm. The prediction algorithm predicts non-termination of the solved-form fixpoint of the logic program model of security protocols. In SPVT-II, if the fixpoint is predicted non-termination, then the abstract approach is used to verify protocols, oth

Androgen 发表于 2025-3-27 17:08:32

Batch ZK Proof and Verification of OR Logic which multiple proof and verification protocols are performed in parallel. It is pointed out in this paper that the highly strong soundness in Cramer et al’s solution is only theoretically valuable and not needed in many applications, which suffer from its low efficiency. So batch proof and verific

不知疲倦 发表于 2025-3-27 21:20:48

http://reply.papertrans.cn/47/4654/465363/465363_36.png

Ointment 发表于 2025-3-28 00:55:24

http://reply.papertrans.cn/47/4654/465363/465363_37.png

谈判 发表于 2025-3-28 03:25:53

Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Modelel. In this paper, we first define the new security model for CLTH-PKE. And then, we construct a new CLTH-PKE scheme with rigorous security proof against the attacks of a malicous KGC in the standard model based on Decisional Bilinear Diffie-Hellman (DBDH) assumption..Compared with the previous CLTH

圆锥体 发表于 2025-3-28 07:04:56

http://reply.papertrans.cn/47/4654/465363/465363_39.png

Autobiography 发表于 2025-3-28 14:20:53

http://reply.papertrans.cn/47/4654/465363/465363_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology; 4th International Co Moti Yung,Peng Liu,Dongdai Lin Conference proceedings 2009 Springer-Verlag Berlin