多嘴 发表于 2025-3-25 04:33:37

,Catching MPC Cheaters: Identification and Openability, with three new properties to discourage cheating. First is a strengthening of ., called . identifiable abort, where all parties who do not follow the protocol will be identified as cheaters by each honest party. The second is ., which means that a third party can determine whether the computation w

调味品 发表于 2025-3-25 11:32:16

http://reply.papertrans.cn/47/4658/465747/465747_22.png

转换 发表于 2025-3-25 12:03:43

Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutatiocards. In existing card-based cryptographic protocols, a special operation of cards called a . is used to achieve the information-theoretic security. Recently, card-based cryptographic protocols have been reconsidered from the viewpoint of multi-party computations. In this direction, a new model of

啮齿动物 发表于 2025-3-25 18:58:53

http://reply.papertrans.cn/47/4658/465747/465747_24.png

小木槌 发表于 2025-3-25 23:41:53

Secure Network Coding for Multiple Unicast: On the Case of Single Source, destinations. The primal goal is to characterize the secure capacity region, where the exchanged messages have to be secured from a passive external eavesdropper that has unbounded computational capabilities, but limited network presence. The secure capacity region for the case of two destinations

Medicaid 发表于 2025-3-26 03:06:29

,Rényi Resolvability and Its Applications to the Wiretap Channel,istribution of a channel in either the total variation distance or the relative entropy. In this paper, we use the (normalized or unnormalized) Rényi divergence (with the Rényi parameter in ) to measure the level of approximation. We also provide asymptotic expressions for normalized Rényi dive

小虫 发表于 2025-3-26 05:31:02

978-3-319-72088-3Springer International Publishing AG 2017

dearth 发表于 2025-3-26 10:09:52

Information Theoretic Security978-3-319-72089-0Series ISSN 0302-9743 Series E-ISSN 1611-3349

coddle 发表于 2025-3-26 14:12:55

https://doi.org/10.1007/978-3-319-72089-0Authentication codes; Adversarial channel models; Biometric security; Bounded storage models; Informatio

朦胧 发表于 2025-3-26 19:27:12

http://reply.papertrans.cn/47/4658/465747/465747_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Information Theoretic Security; 10th International C Junji Shikata Conference proceedings 2017 Springer International Publishing AG 2017 Au