overweight 发表于 2025-3-30 10:47:18

http://reply.papertrans.cn/47/4658/465743/465743_51.png

CAPE 发表于 2025-3-30 15:02:41

Detecting Algebraic Manipulation in Leaky Storage Systemsthe adversary. We study AMD codes when the storage can leak up to . bits of information about the stored codeword, where . is the group that contains the codeword and . is a constant. We propose .-AMD codes that provide protection in this new setting. We define weak and strong .-AMD codes that provi

半圆凿 发表于 2025-3-30 17:41:53

Cheater Detection in SPDZ Multiparty Computationumber of dishonest parties. The SPDZ protocol is distinguished by its fast performance. A downside of the SPDZ protocol is that . can enforce the computation to fail, meaning that the honest parties have to . the computation without learning the outcome, whereas the cheating party may actually learn

Invigorate 发表于 2025-3-30 23:56:48

Error-Correcting Codes Against Chosen-Codeword Attacks introduce a .-fraction of errors by accessing to the encoding and the decoding oracles. Since the unique decoding is not possible for ., we consider list-decodable codes. We present an optimal-rate coding scheme by assuming the existence of one-way functions. The construction is based on the list-d

Ingest 发表于 2025-3-31 04:26:25

Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)sent a new kind of commitment scheme on which we can build a novel and efficient zero-knowledge protocol for circuit satisfiability. Our commitment scheme can be constructed in a black-box manner from any commitment scheme. We can prove knowledge of the AES-key which map a particular plaintext to a

lobster 发表于 2025-3-31 08:06:22

Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustnesse access control for handling entities who can use the data. . can partially provide such flexibility by specifying privileged receivers so that only they can decrypt a ciphertext. However, once privileged receivers are specified, they can be no longer dynamically added and/or removed. In this paper

BAN 发表于 2025-3-31 12:59:32

http://reply.papertrans.cn/47/4658/465743/465743_57.png

DEFER 发表于 2025-3-31 17:06:42

http://reply.papertrans.cn/47/4658/465743/465743_58.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Information Theoretic Security; 9th International Co Anderson C.A. Nascimento,Paulo Barreto Conference proceedings 2016 Springer Internatio