Legend 发表于 2025-3-25 04:27:58

TVES: Threshold Verifiably Encrypted Signature and Its Applicationsator, a trusted third party, to keep the signature a secret but verifiable. The ordinary signature can be revealed at a later stage. In this paper, we propose Threshold Verifiably Encrypted Signature (TVES), which applies threshold cryptography to both signer and adjudicator parties to decentralize

Overthrow 发表于 2025-3-25 09:03:22

http://reply.papertrans.cn/47/4654/465368/465368_22.png

山间窄路 发表于 2025-3-25 14:31:21

Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Pin the blockchain community. One widely adopted technique for privacy preservation is the use of Stealth Address, which serves as a crucial component of Monero’s Ring Confidential Transaction (RingCT) protocol. Liu et al. (EuroS &P’19) introduced and formalized a new signature variant called the Key

骗子 发表于 2025-3-25 19:00:22

Compact Ring Signatures with Post-Quantum Security in Standard Modelntum ring signatures with post-quantum anonymity and post-quantum blind-unforgeability. Assuming the hardness of the learning with errors problem, they proposed a generic construction that transforms any blind-unforgeable (BU) secure signature into a post-quantum ring signature in the standard model

botany 发表于 2025-3-25 21:01:58

Secure Multi-party SM2 Signature Based on SPDZ Protocolo two-party or even multi-party and multi-device scenarios. To meet the needs of multi-party signature scenarios, we propose a multi-party SM2 signature scheme based on SPDZ protocol. The basic signature scheme used in this paper is the SM2 digital signature algorithm in the standard “SM2 Elliptic C

喷油井 发表于 2025-3-26 03:27:49

Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryptionainst the victim node, resulting in the victim node’s available balance being fully locked in the recurring transaction, thereby increasing the cost of collateral due to the longer lock time. The current solution primarily focuses on hiding the balance. However, it is not resistant to LockDown attac

Overdose 发表于 2025-3-26 07:36:06

A General Federated Learning Scheme with Blockchain on Non-IID Datals in machine learning via local training and parameter interactions of participants. However, participants’ data usually shows significant differences, ., the characteristics of non-IID, affecting the convergence speed and accuracy of models to a large extent. In this paper, we propose a general fe

cipher 发表于 2025-3-26 10:49:38

http://reply.papertrans.cn/47/4654/465368/465368_28.png

tenuous 发表于 2025-3-26 13:20:30

http://reply.papertrans.cn/47/4654/465368/465368_29.png

Counteract 发表于 2025-3-26 18:29:26

Geometry-Based Garbled Circuits Relying Solely on One Evaluation Algorithm Under Standard Assumptionircuits (GC) utilize 4 ciphertexts per gate which have attracted great attention for optimizing the performance of communication. Under standard assumption, the best existing optimizations on GC have reduced the number of ciphertexts per gate to 2, while other more efficient optimizations rely on th
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Security and Cryptology; 19th International C Chunpeng Ge,Moti Yung Conference proceedings 2024 The Editor(s) (if applicable) a