Hippocampus 发表于 2025-3-23 13:00:59

http://reply.papertrans.cn/47/4655/465420/465420_11.png

fetter 发表于 2025-3-23 14:03:16

http://reply.papertrans.cn/47/4655/465420/465420_12.png

友好 发表于 2025-3-23 20:09:45

http://reply.papertrans.cn/47/4655/465420/465420_13.png

FLIC 发表于 2025-3-23 23:10:48

http://reply.papertrans.cn/47/4655/465420/465420_14.png

dry-eye 发表于 2025-3-24 06:22:11

http://reply.papertrans.cn/47/4655/465420/465420_15.png

进步 发表于 2025-3-24 10:14:10

http://reply.papertrans.cn/47/4655/465420/465420_16.png

遍及 发表于 2025-3-24 14:19:16

http://reply.papertrans.cn/47/4655/465420/465420_17.png

OMIT 发表于 2025-3-24 17:10:05

http://reply.papertrans.cn/47/4655/465420/465420_18.png

bisphosphonate 发表于 2025-3-24 19:12:00

A dynamic secret sharing scheme with cheater detection, shadows can be reused after recovering or renewing the shared secret. Thus the new scheme is efficient and practical. In addition, the new scheme can detect the cheaters. Furthermore, the amount of public data is still proportional to the number of shadowholders.

ACME 发表于 2025-3-24 23:22:14

http://reply.papertrans.cn/47/4655/465420/465420_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Information Security and Privacy; First Australasian C Josef Pieprzyk,Jennifer Seberry Conference proceedings 1996 Springer-Verlag Berlin H