Uncultured 发表于 2025-3-28 15:38:34

A Game-Theoretic Perspective on Oblivious Transferage” oblivious transfer protocols by using a game-theoretic concept. Specifically, we present a single two-player game for two-message oblivious transfer in the game-theoretic framework, where it captures the cryptographic properties of correctness and privacy in the presence of . adversaries.

他一致 发表于 2025-3-28 21:09:23

http://reply.papertrans.cn/47/4655/465415/465415_42.png

奇思怪想 发表于 2025-3-29 01:28:01

http://reply.papertrans.cn/47/4655/465415/465415_43.png

津贴 发表于 2025-3-29 04:28:02

Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Construcdition, we create a new probabilistic SCUS scheme, which is very compact. The confirmation and disavowal protocols of these SCUS are efficient, and can be run either sequentially, concurrently, or arbitrarily. These protocols are based on what we call ., which are of independent interest.

GRATE 发表于 2025-3-29 09:54:12

http://reply.papertrans.cn/47/4655/465415/465415_45.png

污秽 发表于 2025-3-29 15:28:20

http://reply.papertrans.cn/47/4655/465415/465415_46.png

懒鬼才会衰弱 发表于 2025-3-29 16:45:48

Cryptanalysis of RSA with a Small Parametermemory . by using the baby-step giant-step method, and in time . and negligible memory by applying Pollard . method. As an application of our new attacks, we present the cryptanalysis on an RSA-type scheme proposed by Sun et al.

Introvert 发表于 2025-3-29 21:55:00

Zero-Knowledge Protocols for the McEliece Encryptionnomially bounded verifier on a joint input (.,.,.) that . is a valid encryption of ., without performing decryption. These protocols are the first PPK and the first verifiable encryption for code-based cryptosystems.

事先无准备 发表于 2025-3-30 03:42:40

http://reply.papertrans.cn/47/4655/465415/465415_49.png

郊外 发表于 2025-3-30 04:34:19

Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchangels, in which computation of unauthenticated session keys requires one round and proceeds with minimal computation and communication overhead. The first one-round authenticated 3KE version that preserved the unique efficiency properties of the original protocol and strengthened its security towards r
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security and Privacy; 17th Australasian Co Willy Susilo,Yi Mu,Jennifer Seberry Conference proceedings 2012 Springer-Verlag Berl