泥沼 发表于 2025-4-1 04:05:51

http://reply.papertrans.cn/47/4661/466014/466014_61.png

发酵 发表于 2025-4-1 10:03:00

http://reply.papertrans.cn/47/4661/466014/466014_62.png

系列 发表于 2025-4-1 11:54:16

http://reply.papertrans.cn/47/4661/466014/466014_63.png

追踪 发表于 2025-4-1 17:07:07

Linear, Constant-Rounds Bit-Decompositions typical, and the case for both examples) the solution is constant-rounds and requires only .(log.) secure ring multiplications..The solution is secure against active adversaries assuming the existence of additional primitives. These exist for both the Shamir sharing based approach as well as the Paillier based one.
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Information Security and Cryptology - ICISC 2009; 12th International C Donghoon Lee,Seokhie Hong Conference proceedings 2010 Springer-Verla