简略 发表于 2025-3-27 00:24:38

http://reply.papertrans.cn/47/4658/465742/465742_31.png

RAFF 发表于 2025-3-27 01:47:54

http://reply.papertrans.cn/47/4658/465742/465742_32.png

WATER 发表于 2025-3-27 07:42:51

Strongly Multiplicative Hierarchical Threshold Secret Sharing hierarchy. First, we give necessary conditions for multiplication of secrets in a hierarchical threshold linear secret sharing scheme (LSSS). Starting with known ideal constructions, we then propose a modified scheme with improved multiplication properties. We give sufficient conditions for the new

CAMP 发表于 2025-3-27 12:14:24

Secret Sharing Comparison by Transformation and Rotationme ., it is possible to compute a sharing of . such that . = (. < .) with only eight rounds and 29ℓ + 36log.(ℓ) invocations of the multiplication protocol, where ℓ = log(.). The protocol is unconditionally secure against active/adaptive adversaries when the underlying secret sharing scheme has these

征税 发表于 2025-3-27 17:34:12

http://reply.papertrans.cn/47/4658/465742/465742_35.png

violate 发表于 2025-3-27 21:04:42

Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlatsecurity for both parties, hence building OT assuming noisy resources (channels or correlations) available to them. This primitive is about transmitting two strings such that the receiver can obtain one (and only one) of them, while the sender remains ignorant of this choice. Recently, Winter and Na

角斗士 发表于 2025-3-28 00:39:42

http://reply.papertrans.cn/47/4658/465742/465742_37.png

Hallowed 发表于 2025-3-28 06:01:25

http://reply.papertrans.cn/47/4658/465742/465742_38.png

动脉 发表于 2025-3-28 06:28:17

Renato Renner,Stefan Wolf,Jürg Wullschlegerntend with combination of cycles from both the nominal series and the deflator series, which could generate spurious measures of co-movement. The spectral work indicates that there is evidence of the ‘great moderation’ in Price, Construction Expenditure, Income, and Consumption within longer cycles

Offset 发表于 2025-3-28 10:35:59

http://reply.papertrans.cn/47/4658/465742/465742_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Theoretic Security; Second International Yvo Desmedt Conference proceedings 2009 Springer-Verlag Berlin Heidelberg 2009 Kolmogo