荣幸 发表于 2025-3-26 22:54:46

An Extended Logic for Analyzing Timed-Release Public-Key Protocolsan extension to an existing cryptographic modal logic with time due to Coffey and Saidha. The extension is designed to help capture aspects of timed-release public key protocols that are not captured in the Coffey-Saidha logic. The explicit use of time in the logic is shown to facilitate reasoning about the correctness of an example protocol.

mighty 发表于 2025-3-27 05:01:08

http://reply.papertrans.cn/47/4658/465788/465788_32.png

Ostrich 发表于 2025-3-27 07:31:40

Reaction Attacks against Several Public-Key Cryptosystem systems base their security on the apparent intractibility of one or more problems. The attacks we present do not violate the intractibility of the underlying problems, but instead obtain information about the private key or plaintext by watching the reaction of someone decrypting a given ciphertex

RALES 发表于 2025-3-27 12:43:59

http://reply.papertrans.cn/47/4658/465788/465788_34.png

人类的发源 发表于 2025-3-27 13:42:58

http://reply.papertrans.cn/47/4658/465788/465788_35.png

重画只能放弃 发表于 2025-3-27 18:46:51

http://reply.papertrans.cn/47/4658/465788/465788_36.png

Invertebrate 发表于 2025-3-27 22:18:23

Detachable Electronic Coinsbinary tree structure. Contemporary electronic cash solutions rely on the divisibility paradigm to achieve significant computational savings, and such techniques are considered to be the most efficient. We demonstrate an alternative approach that employs batch cryptography to withdraw and spend mult

Minatory 发表于 2025-3-28 05:21:52

Linear Secret Sharing with Divisible Sharesconverted into its linear equivalent defined over .(.). A notion of uniform perfectness is introduced and it is proved that Shamir schemes built over .(..) are not uniformly perfect. Probabilistic linear secret sharing is next studied and bounds on probability that the resulting secret sharing is un

航海太平洋 发表于 2025-3-28 10:14:52

Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery are correctly distributed. We present new such schemes and use them to share discrete logarithms and integer factorizations. The shareholders will be able to recover their shares quickly (fast recovery) or after a predetermined amount of computations (delayed recovery) to prevent the recovery of al

Irksome 发表于 2025-3-28 11:05:31

http://reply.papertrans.cn/47/4658/465788/465788_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information and Communication Security; Second International Vijay Varadharajan,Yi Mu Conference proceedings 1999 Springer-Verlag Berlin He