Classify 发表于 2025-3-23 11:48:06
http://reply.papertrans.cn/47/4654/465388/465388_11.pngGrandstand 发表于 2025-3-23 16:29:50
Excalibur Key-Generation Protocols for DAG Hierarchic Decryptioncocoon 发表于 2025-3-23 19:46:43
https://doi.org/10.1007/978-3-030-12146-4artificial intelligence; authentication; ciphertexts; cryptography; data mining; data privacy; electronicConnotation 发表于 2025-3-24 00:19:07
http://reply.papertrans.cn/47/4654/465388/465388_14.png偏见 发表于 2025-3-24 04:32:43
Information Security and Cryptology – ICISC 2018978-3-030-12146-4Series ISSN 0302-9743 Series E-ISSN 1611-3349秘密会议 发表于 2025-3-24 10:04:44
http://reply.papertrans.cn/47/4654/465388/465388_16.png不自然 发表于 2025-3-24 13:34:03
The Six-Card Trick: Secure Computation of Three-Input Equalitywn that secure computation can be done by using a deck of physical cards. The . proposed by den Boer in 1989 is the first card-based protocol, which computes the logical AND function of two inputs. In this paper, we design a new protocol for the three-input equality function using six cards, which we call the ..ingestion 发表于 2025-3-24 17:17:39
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465388.jpg增减字母法 发表于 2025-3-24 21:24:36
An Efficient Private Evaluation of a Decision Graphdant with theoretical complexities. Our method can process a graph with approximately 500 nodes in only 11 s on a standard laptop computer. We also compared the runtime of our method with that of previous methods and confirmed that it was one order of magnitude faster than the previous methods.perpetual 发表于 2025-3-25 02:33:19
Unconditionally Secure Distributed Oblivious Polynomial Evaluationthe model for distributed oblivious transfer (DOT) described by Blundo et al. in 2002. We then describe a protocol that achieves the security defined by our model..Our DOPE protocol is efficient and achieves a high level of security. Furthermore, our proposed protocol can also be used as a DOT protocol with little to no modification.