从属 发表于 2025-3-28 14:41:19

Efficient Intrusion-Resilient Signatures Without Random Oraclesiod, past periods remain safe. In this work, we propose the first intrusion-resilient signature in the standard model (i.e. without random oracles) which provides both short signatures and at most log-squared private storage in the number of time periods.

MIRE 发表于 2025-3-28 21:21:51

http://reply.papertrans.cn/47/4654/465370/465370_42.png

vertebrate 发表于 2025-3-29 02:51:18

http://reply.papertrans.cn/47/4654/465370/465370_43.png

脖子 发表于 2025-3-29 06:54:14

http://reply.papertrans.cn/47/4654/465370/465370_44.png

阴郁 发表于 2025-3-29 08:51:08

Conference proceedings 2006ation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of Chinese Academy of Sciences and the National Natural Science Foundations of China. T

敏捷 发表于 2025-3-29 13:47:48

Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Schemeoes not require every share to be authenticated before being processed by the combiner. This will enable us to reduce the number of elements to be publicly known to recover the secret to one digest produced by a collision resistant hash function which is smaller than the requirements of most verifiable secret sharing schemes.

和音 发表于 2025-3-29 16:36:30

http://reply.papertrans.cn/47/4654/465370/465370_47.png

Basal-Ganglia 发表于 2025-3-29 23:24:23

http://reply.papertrans.cn/47/4654/465370/465370_48.png

APEX 发表于 2025-3-30 02:39:53

Haeryong Park,Zhengjun Cao,Lihua Liu,Seongan Lim,Ikkwon Yie,Kilsoo Chun no infrastructure in space to service or upgrade these systems. An infrastructure for facilities in space would have the potential to reduce the cost of space systems, increase their performance, reduce their risk, improve their flexibility, and even enable new space missions. As the technologies f

大气层 发表于 2025-3-30 04:09:22

http://reply.papertrans.cn/47/4654/465370/465370_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security and Cryptology; Second SKLOIS Confer Helger Lipmaa,Moti Yung,Dongdai Lin Conference proceedings 2006 Springer-Verlag B