不能强迫我 发表于 2025-3-25 04:29:58

http://reply.papertrans.cn/87/8635/863448/863448_21.png

minimal 发表于 2025-3-25 09:50:21

History-Free Sequential Aggregate Signaturesite compression, some notion of unforgeability is preserved. Recently, Eikemeier et al. (SCN 2010) considered the notion of . sequential aggregation for message authentication codes, where the sequentially-executed aggregation algorithm does not need to receive the previous messages in the sequence

arcane 发表于 2025-3-25 15:20:10

http://reply.papertrans.cn/87/8635/863448/863448_23.png

reception 发表于 2025-3-25 16:09:59

http://reply.papertrans.cn/87/8635/863448/863448_24.png

gustation 发表于 2025-3-25 22:22:04

Decentralized Dynamic Broadcast Encryptions the data to the registered users according to a specific policy (the target set), and the users that decrypt the data if they are authorized by the policy. Public-key broadcast encryption can be seen as removing this special role of encryptor, by allowing anybody to send encrypted data. In this pa

预兆好 发表于 2025-3-26 03:11:18

Time-Specific Encryption from Forward-Secure Encryptioncryption with additional functionality where an encryptor can specify a suitable time interval, meaning that the ciphertexts may only be decrypted within this time interval. In this work, we propose a new methodology for designing efficient TSE scheme by using forward-secure encryption (FSE), and ba

滔滔不绝地讲 发表于 2025-3-26 08:04:44

Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuitsh relies on the . (IT) Garbled Circuit (GC), which is more efficient than Yao’s GC on shallow circuits. When evaluating a large circuit, we “slice” it into thin layers and evaluate them with IT GC. Motivated by the client-server setting, we propose two variants of our construction: one for semi-hone

Fillet,Filet 发表于 2025-3-26 08:59:22

http://reply.papertrans.cn/87/8635/863448/863448_28.png

Truculent 发表于 2025-3-26 16:08:39

Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocolshonest majority of active adversaries. We present a number of modifications to the protocol; the first reduces the security to covert security, but produces significant performance enhancements; the second enables us to perform bit-wise operations in characteristic two fields. As a bench mark appli

匍匐前进 发表于 2025-3-26 18:32:52

http://reply.papertrans.cn/87/8635/863448/863448_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Security and Cryptography for Networks; 8th International Co Ivan Visconti,Roberto Prisco Conference proceedings 2012 Springer-Verlag Berli