Generator
发表于 2025-3-26 22:19:42
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465412.jpg
mitten
发表于 2025-3-27 02:12:35
978-3-031-22300-6The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
统治人类
发表于 2025-3-27 08:12:08
Information Security and Privacy978-3-031-22301-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
Alveoli
发表于 2025-3-27 10:07:01
https://doi.org/10.1007/978-3-031-22301-3authentication; block ciphers; blockchain; computer networks; computer security; computer systems; cryptan
BOOR
发表于 2025-3-27 13:35:56
http://reply.papertrans.cn/47/4655/465412/465412_35.png
Collar
发表于 2025-3-27 20:07:29
http://reply.papertrans.cn/47/4655/465412/465412_36.png
懒洋洋
发表于 2025-3-27 22:33:26
http://reply.papertrans.cn/47/4655/465412/465412_37.png
Assault
发表于 2025-3-28 02:15:30
Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018, which is shown to require exponential complexity for the proposed attack. Additionally, we apply this attack to cryptanalyze another Gabidulin code based cryptosystem proposed by Loidreau at PQCrypto 2017, and improve Loidreau’s result in a talk at CBCrypto 2021.
Density
发表于 2025-3-28 09:07:58
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryptionith both efficiency and richer functionality are known so far. In this paper, we propose a “two-level" KH-PKE scheme for evaluating degree-two polynomials, by cleverly combining Emura et al.’s generic framework with a recent efficient two-level HE by Attrapadung et al. (ASIACCS 2018).
fodlder
发表于 2025-3-28 14:02:19
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspaces indistinguishable from signatures generated by the signer. Only the signer and the designated entity can generate a valid signature for any combined vector. Finally, we prove our scheme is secure under the CDH problem assumption and show it is efficient.