aesthetician
发表于 2025-3-25 05:59:04
A Topological Condition for Solving Fair Exchange in Byzantine Environmentsted and untrusted processes, and propose a specification of the fair exchange problem that clearly separates safety and liveness, via fine-grained properties. We then show that the solvability of fair exchange depends on a necessary and sufficient topological condition, which we name the . condition
表状态
发表于 2025-3-25 10:48:57
A Security Analysis of the Precise Time Protocol (Short Paper)o (a) incorrectly resynchronize clocks, (b) rearrange or disrupt the hierarchy of PTP clocks, (c) bring the protocol participants into an inconsistent state, or (d) deprive victim slave clocks from synchronization in ways undetectable by generic network intrusion detection systems. We also propose c
Abnormal
发表于 2025-3-25 14:23:57
An Identity-Based Proxy Signature Scheme from Pairingslf of the original signer. In this paper we propose an ID-based proxy signature scheme from bilinear pairings. We provide exact security proof of the proposed ID-based proxy signature scheme in the random oracle model under the Computational Diffie-Hellman assumption without using Forking Lemma.
Licentious
发表于 2025-3-25 19:47:19
http://reply.papertrans.cn/47/4660/465901/465901_24.png
遵循的规范
发表于 2025-3-25 21:01:12
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)any schemes proposed, but most of them have already been found flawed due to the lack of formal security analysis. On the cryptanalysis of this type of schemes, in this paper, we further review two recently proposed schemes and show that their security claims are invalid. To address the current issu
抗生素
发表于 2025-3-26 01:44:35
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Sizeproposed method to this scheme, the ciphertext size is reduced from . to .(.+log(./.)) without a substantial increase in the decryption-key size, where .,. denote the maximum number of colluders in a coalition and the total number of receivers respectively. The resulting scheme also supports black-b
Mettle
发表于 2025-3-26 07:40:57
http://reply.papertrans.cn/47/4660/465901/465901_27.png
纤细
发表于 2025-3-26 11:24:23
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocolsation about the attributes. Previous OCBE protocols are designed by taking zero-knowledge proof protocols that prove a committed value satisfies some property and changing the protocols so that instead of one party proving to the other party, the two parties compute two keys that agree if and only i
哎呦
发表于 2025-3-26 15:39:22
http://reply.papertrans.cn/47/4660/465901/465901_29.png
样式
发表于 2025-3-26 17:16:19
http://reply.papertrans.cn/47/4660/465901/465901_30.png