Legend 发表于 2025-3-25 04:27:58
TVES: Threshold Verifiably Encrypted Signature and Its Applicationsator, a trusted third party, to keep the signature a secret but verifiable. The ordinary signature can be revealed at a later stage. In this paper, we propose Threshold Verifiably Encrypted Signature (TVES), which applies threshold cryptography to both signer and adjudicator parties to decentralizeOverthrow 发表于 2025-3-25 09:03:22
http://reply.papertrans.cn/47/4654/465368/465368_22.png山间窄路 发表于 2025-3-25 14:31:21
Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Pin the blockchain community. One widely adopted technique for privacy preservation is the use of Stealth Address, which serves as a crucial component of Monero’s Ring Confidential Transaction (RingCT) protocol. Liu et al. (EuroS &P’19) introduced and formalized a new signature variant called the Key骗子 发表于 2025-3-25 19:00:22
Compact Ring Signatures with Post-Quantum Security in Standard Modelntum ring signatures with post-quantum anonymity and post-quantum blind-unforgeability. Assuming the hardness of the learning with errors problem, they proposed a generic construction that transforms any blind-unforgeable (BU) secure signature into a post-quantum ring signature in the standard modelbotany 发表于 2025-3-25 21:01:58
Secure Multi-party SM2 Signature Based on SPDZ Protocolo two-party or even multi-party and multi-device scenarios. To meet the needs of multi-party signature scenarios, we propose a multi-party SM2 signature scheme based on SPDZ protocol. The basic signature scheme used in this paper is the SM2 digital signature algorithm in the standard “SM2 Elliptic C喷油井 发表于 2025-3-26 03:27:49
Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryptionainst the victim node, resulting in the victim node’s available balance being fully locked in the recurring transaction, thereby increasing the cost of collateral due to the longer lock time. The current solution primarily focuses on hiding the balance. However, it is not resistant to LockDown attacOverdose 发表于 2025-3-26 07:36:06
A General Federated Learning Scheme with Blockchain on Non-IID Datals in machine learning via local training and parameter interactions of participants. However, participants’ data usually shows significant differences, ., the characteristics of non-IID, affecting the convergence speed and accuracy of models to a large extent. In this paper, we propose a general fecipher 发表于 2025-3-26 10:49:38
http://reply.papertrans.cn/47/4654/465368/465368_28.pngtenuous 发表于 2025-3-26 13:20:30
http://reply.papertrans.cn/47/4654/465368/465368_29.pngCounteract 发表于 2025-3-26 18:29:26
Geometry-Based Garbled Circuits Relying Solely on One Evaluation Algorithm Under Standard Assumptionircuits (GC) utilize 4 ciphertexts per gate which have attracted great attention for optimizing the performance of communication. Under standard assumption, the best existing optimizations on GC have reduced the number of ciphertexts per gate to 2, while other more efficient optimizations rely on th