Perceive 发表于 2025-4-1 02:32:40

http://reply.papertrans.cn/47/4654/465385/465385_61.png

fleeting 发表于 2025-4-1 08:01:39

Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithmsning time of an entire system. Therefore, there is a long list of work on improving its efficiency. It is also true in the context of secure multi-party computation (MPC), and several MPC sorting protocols have been proposed. However, all existing MPC sorting protocols are based on less efficient so

Rotator-Cuff 发表于 2025-4-1 11:30:56

Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocolway and two-party authenticated key agreement protocols and propose a concrete certificateless one-way and two-party authenticated key agreement protocol. The security of our protocol is proven under the computational Diffie-Hellman, square computational Diffie-Hellman and gap bilinear Diffie-Hellma

组成 发表于 2025-4-1 17:16:15

http://reply.papertrans.cn/47/4654/465385/465385_64.png

绑架 发表于 2025-4-1 20:18:06

Ciphertext Policy Multi-dimensional Range Encryptionc range. In this paper, we propose the notion of (ciphertext-policy) range encryption (RE) that can be used in many of such applications. RE is a type of public key encryption with additional functionality where an encryptor can freely specify a range to a ciphertext so that it can be decrypted only
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Information Security and Cryptology -- ICISC 2012; 15th International C Taekyoung Kwon,Mun-Kyu Lee,Daesung Kwon Conference proceedings 2013