hypothyroidism 发表于 2025-3-21 18:08:31

书目名称Information Theoretic Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465742<br><br>        <br><br>书目名称Information Theoretic Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465742<br><br>        <br><br>书目名称Information Theoretic Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465742<br><br>        <br><br>书目名称Information Theoretic Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465742<br><br>        <br><br>书目名称Information Theoretic Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465742<br><br>        <br><br>书目名称Information Theoretic Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465742<br><br>        <br><br>书目名称Information Theoretic Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465742<br><br>        <br><br>书目名称Information Theoretic Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465742<br><br>        <br><br>书目名称Information Theoretic Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465742<br><br>        <br><br>书目名称Information Theoretic Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465742<br><br>        <br><br>

Contracture 发表于 2025-3-21 22:42:28

http://reply.papertrans.cn/47/4658/465742/465742_2.png

决定性 发表于 2025-3-22 01:11:28

http://reply.papertrans.cn/47/4658/465742/465742_3.png

使害羞 发表于 2025-3-22 08:02:49

http://reply.papertrans.cn/47/4658/465742/465742_4.png

细丝 发表于 2025-3-22 09:31:02

Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement and Carol. We derive joint bounds on the lengths of these keys. Our protocols combine distributed variants of Slepian-Wolf coding and the leftover hash lemma. The obtained bounds are expressed in terms of smooth Rényi entropies and show that these quantities are useful in this—single-serving—context as well.

Carcinogen 发表于 2025-3-22 14:43:04

http://reply.papertrans.cn/47/4658/465742/465742_6.png

Malleable 发表于 2025-3-22 18:40:46

Almost Secure (1-Round, ,-Channel) Message Transmission Schemeheaters. By using our equivalence, we derive a lower bound on the communication complexity of almost secure MT schemes. Finally, we present a near optimum scheme which meets our bound approximately. This is the first construction of provably secure almost secure (1-round, .-channel) MT schemes for . = 2. + 1.

Cirrhosis 发表于 2025-3-23 00:10:52

Anonymous Quantum Communicatione quantum state can only be destroyed with exponentially small probability: if the protocol succeeds, the state is transferred to the receiver and otherwise it remains in the hands of the sender (provided the receiver is honest).

ANNUL 发表于 2025-3-23 03:59:24

Unconditionally Secure Chaffing-and-Winnowing for Multiple Usetime pad with a short ciphertext size. Interestingly, when applying this method to a known A-code, this becomes a known construction of a non-malleable one-time pad. This fact implies that the notions of authentication and encryption can be seamlessly connected by chaffing-and-winnowing mechanism.

Heart-Rate 发表于 2025-3-23 06:27:01

Secret Sharing Comparison by Transformation and Rotationhe inputs become available, this is important for practical implementations of multiparty computations, where one can have a set-up phase. Ignoring pre-processing in the analysis, only two rounds and 4ℓ invocations of the multiplication protocol are required.
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Information Theoretic Security; Second International Yvo Desmedt Conference proceedings 2009 Springer-Verlag Berlin Heidelberg 2009 Kolmogo