Classify 发表于 2025-3-23 11:48:06

http://reply.papertrans.cn/47/4654/465388/465388_11.png

Grandstand 发表于 2025-3-23 16:29:50

Excalibur Key-Generation Protocols for DAG Hierarchic Decryption

cocoon 发表于 2025-3-23 19:46:43

https://doi.org/10.1007/978-3-030-12146-4artificial intelligence; authentication; ciphertexts; cryptography; data mining; data privacy; electronic

Connotation 发表于 2025-3-24 00:19:07

http://reply.papertrans.cn/47/4654/465388/465388_14.png

偏见 发表于 2025-3-24 04:32:43

Information Security and Cryptology – ICISC 2018978-3-030-12146-4Series ISSN 0302-9743 Series E-ISSN 1611-3349

秘密会议 发表于 2025-3-24 10:04:44

http://reply.papertrans.cn/47/4654/465388/465388_16.png

不自然 发表于 2025-3-24 13:34:03

The Six-Card Trick: Secure Computation of Three-Input Equalitywn that secure computation can be done by using a deck of physical cards. The . proposed by den Boer in 1989 is the first card-based protocol, which computes the logical AND function of two inputs. In this paper, we design a new protocol for the three-input equality function using six cards, which we call the ..

ingestion 发表于 2025-3-24 17:17:39

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465388.jpg

增减字母法 发表于 2025-3-24 21:24:36

An Efficient Private Evaluation of a Decision Graphdant with theoretical complexities. Our method can process a graph with approximately 500 nodes in only 11 s on a standard laptop computer. We also compared the runtime of our method with that of previous methods and confirmed that it was one order of magnitude faster than the previous methods.

perpetual 发表于 2025-3-25 02:33:19

Unconditionally Secure Distributed Oblivious Polynomial Evaluationthe model for distributed oblivious transfer (DOT) described by Blundo et al. in 2002. We then describe a protocol that achieves the security defined by our model..Our DOPE protocol is efficient and achieves a high level of security. Furthermore, our proposed protocol can also be used as a DOT protocol with little to no modification.
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Information Security and Cryptology – ICISC 2018; 21st International C Kwangsu Lee Conference proceedings 2019 Springer Nature Switzerland