纬线 发表于 2025-3-27 00:45:04

http://reply.papertrans.cn/47/4654/465367/465367_31.png

琐碎 发表于 2025-3-27 02:03:53

http://reply.papertrans.cn/47/4654/465367/465367_32.png

Hyperalgesia 发表于 2025-3-27 06:56:07

https://doi.org/10.1007/978-3-030-71852-7access control; authentication; communication; communication systems; computer hardware; computer network

芭蕾舞女演员 发表于 2025-3-27 10:37:16

Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryptione. The security of our generic SR-HIBE scheme inherits those of the underlying building blocks. Furthermore, when the maximum hierarchical depth is one, we obtain a generic construction of SR-IBE schemes from . IBE scheme and two-level HIBE scheme.

Evacuate 发表于 2025-3-27 16:10:56

Distributed Key Generation for SM9-Based Systems secure and completely eliminates the single point of failures in SM9 that is concerned by the industry. The experimental analysis indicates that the proposed scheme is efficient, e.g., up to 1 million private key generation requests can be handled per day.

overture 发表于 2025-3-27 21:39:32

http://reply.papertrans.cn/47/4654/465367/465367_36.png

投票 发表于 2025-3-28 00:01:44

http://reply.papertrans.cn/47/4654/465367/465367_37.png

Indent 发表于 2025-3-28 06:00:24

http://reply.papertrans.cn/47/4654/465367/465367_38.png

eucalyptus 发表于 2025-3-28 06:42:14

http://reply.papertrans.cn/47/4654/465367/465367_39.png

defendant 发表于 2025-3-28 14:27:13

http://reply.papertrans.cn/47/4654/465367/465367_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Security and Cryptology; 16th International C Yongdong Wu,Moti Yung Conference proceedings 2021 Springer Nature Switzerland AG