荣幸 发表于 2025-3-26 22:54:46
An Extended Logic for Analyzing Timed-Release Public-Key Protocolsan extension to an existing cryptographic modal logic with time due to Coffey and Saidha. The extension is designed to help capture aspects of timed-release public key protocols that are not captured in the Coffey-Saidha logic. The explicit use of time in the logic is shown to facilitate reasoning about the correctness of an example protocol.mighty 发表于 2025-3-27 05:01:08
http://reply.papertrans.cn/47/4658/465788/465788_32.pngOstrich 发表于 2025-3-27 07:31:40
Reaction Attacks against Several Public-Key Cryptosystem systems base their security on the apparent intractibility of one or more problems. The attacks we present do not violate the intractibility of the underlying problems, but instead obtain information about the private key or plaintext by watching the reaction of someone decrypting a given ciphertexRALES 发表于 2025-3-27 12:43:59
http://reply.papertrans.cn/47/4658/465788/465788_34.png人类的发源 发表于 2025-3-27 13:42:58
http://reply.papertrans.cn/47/4658/465788/465788_35.png重画只能放弃 发表于 2025-3-27 18:46:51
http://reply.papertrans.cn/47/4658/465788/465788_36.pngInvertebrate 发表于 2025-3-27 22:18:23
Detachable Electronic Coinsbinary tree structure. Contemporary electronic cash solutions rely on the divisibility paradigm to achieve significant computational savings, and such techniques are considered to be the most efficient. We demonstrate an alternative approach that employs batch cryptography to withdraw and spend multMinatory 发表于 2025-3-28 05:21:52
Linear Secret Sharing with Divisible Sharesconverted into its linear equivalent defined over .(.). A notion of uniform perfectness is introduced and it is proved that Shamir schemes built over .(..) are not uniformly perfect. Probabilistic linear secret sharing is next studied and bounds on probability that the resulting secret sharing is un航海太平洋 发表于 2025-3-28 10:14:52
Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery are correctly distributed. We present new such schemes and use them to share discrete logarithms and integer factorizations. The shareholders will be able to recover their shares quickly (fast recovery) or after a predetermined amount of computations (delayed recovery) to prevent the recovery of alIrksome 发表于 2025-3-28 11:05:31
http://reply.papertrans.cn/47/4658/465788/465788_40.png