彩色 发表于 2025-3-28 17:48:15
Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Ped alongside other secure components within a complex blockchain system to achieve various security objectives. However, achieving security of a comprehensive system requires additional analysis on the entire system, considering mutual impacts among protocols. Hence, it is crucial to introduce a unidictator 发表于 2025-3-28 21:04:04
Compact Ring Signatures with Post-Quantum Security in Standard Modelntially unforgeable under a chosen message attack (EUF-CMA) secure signature into a BU secure signature. Hence, through our work, one can easily build a compact post-quantum ring signature in the standard model directly from any EUF-CMA secure signature.overwrought 发表于 2025-3-29 03:00:01
http://reply.papertrans.cn/47/4654/465368/465368_43.pngtolerance 发表于 2025-3-29 06:26:32
Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryptiones a homomorphic one-way function to encrypt a payment path that satisfies the sender’s requirements, and the results in hiding path information such as the identity of the nodes in this path. This ensures that the sender does not steal information about the payment path in advance of adopting the pAVOID 发表于 2025-3-29 07:37:25
A General Federated Learning Scheme with Blockchain on Non-IID DataThe scheme achieves effective training of models while ensuring security. Experimental results show that the proposed scheme can speed up model convergence and improve the model’s accuracy simultaneously. In the non-IID scenario, compared with the federated learning benchmark scheme, the accuracy in可触知 发表于 2025-3-29 14:41:05
A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservationine-grained controllable PHR sharing. In addition, the blockchain-based proxy re-encryption method can protect the confidentiality of PHR and prevent privacy leakage. Security analysis shows that our scheme achieves the expected security goals. Besides, we evaluated the proposed scheme on Hyperledgeostensible 发表于 2025-3-29 19:08:56
http://reply.papertrans.cn/47/4654/465368/465368_47.png吃掉 发表于 2025-3-29 21:38:06
Full Domain Functional Bootstrapping with Least Significant Bit Encoding can evaluate arbitrary functions. In addition, our technique can be applied to multi-value bootstrapping and tree-based bootstrapping. Thus, these algorithms only need one FBS to achieve the full domain property..Finally, we implement our full domain functional bootstrapping in the OpenFHE cryptogrCarminative 发表于 2025-3-30 01:44:39
http://reply.papertrans.cn/47/4654/465368/465368_49.png毗邻 发表于 2025-3-30 06:51:55
http://reply.papertrans.cn/47/4654/465368/465368_50.png