重叠 发表于 2025-3-25 04:01:24

http://reply.papertrans.cn/47/4655/465416/465416_21.png

intrigue 发表于 2025-3-25 09:13:54

http://reply.papertrans.cn/47/4655/465416/465416_22.png

轻快带来危险 发表于 2025-3-25 13:01:55

KDM-Secure Public-Key Encryption from Constant-Noise LPNraic structure. Over the years, constructions of different public-key primitives were proposed from LPN, but most of them are based on the LPN assumption with . rate rather than . rate. A recent breakthrough was made by Yu and Zhang (Crypto’16), who constructed the first Public-Key Encryption (PKE)

讨好美人 发表于 2025-3-25 17:55:52

Long-Term Secure Commitments via Extractable-Binding Commitments used commitment schemes is threatened in the long-term, when adversaries become computationally much more powerful. We improve over this situation by putting forward a new notion of commitment schemes, so called .. These schemes allow for long-term protection because they allow to adjust the protec

有权 发表于 2025-3-25 21:14:00

New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryptionrmula .. Thus our KP-(resp. CP-)ABE has non-redundant ciphertexts (resp. secret keys). For achieving the results, we develop a new encoding method for access policy matrix for ABE, by . into its matrix and randomness, and . the LSS shares in simulation. The new techniques are of independent interest

JEER 发表于 2025-3-26 02:39:10

http://reply.papertrans.cn/47/4655/465416/465416_26.png

COMA 发表于 2025-3-26 07:16:45

http://reply.papertrans.cn/47/4655/465416/465416_27.png

保守 发表于 2025-3-26 10:21:42

http://reply.papertrans.cn/47/4655/465416/465416_28.png

escalate 发表于 2025-3-26 13:24:37

http://reply.papertrans.cn/47/4655/465416/465416_29.png

文字 发表于 2025-3-26 19:11:12

Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistancedynamically and efficiently. To capture a realistic scenario, Seo and Emura introduced an additional important security notion, called . (DKER), where an adversary is allowed to query short-term decryption keys. Although several RIBE schemes that satisfy DKER have been proposed, all the lattice-base
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Security and Privacy; 22nd Australasian Co Josef Pieprzyk,Suriadi Suriadi Conference proceedings 2017 Springer International Pu