找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advances in Cryptology – EUROCRYPT 2012; 31st Annual Internat David Pointcheval,Thomas Johansson Conference proceedings 2012 International

[复制链接]
楼主: interminable
发表于 2025-4-1 02:36:10 | 显示全部楼层
Jeffrey D. Hosenpud,Mark J. Mortoninvertible function of the master secret key and the identity-based secret key. In particular, this is more general than the tolerance of Chow et al.’s IBE schemes (CCS ’10) and Lewko et al.’s IBE schemes (TCC ’11), in which the leakage is bounded by a pre-defined number of bits; yet our constructio
发表于 2025-4-1 06:57:51 | 显示全部楼层
Jonathan M. Chen MD,Niloo M. Edwards MDa new quantum rewinding technique that allows us to extract witnesses in many classical proofs of knowledge. We give criteria under which a classical proof of knowledge is a quantum proof of knowledge. Combining our results with Watrous’ results on quantum zero-knowledge, we show that there are zero
发表于 2025-4-1 13:45:37 | 显示全部楼层
发表于 2025-4-1 16:44:19 | 显示全部楼层
发表于 2025-4-1 18:59:21 | 显示全部楼层
Primary Cardiac Tumors in the Pediatric Age,give no information on the shared secret, and reconstruction is possible even if up to . out of the . shares are incorrect. The interesting setting is ./3 ≤ . < ./2, where reconstruction of a shared secret in the presence of faulty shares is possible, but only with an increase in the share size, and
发表于 2025-4-1 23:30:56 | 显示全部楼层
Primary Cardiac Tumors in the Pediatric Age,rized with tags. Each tag can either be injective or lossy, which leads to an invertible or a lossy function. The interesting property of ABM-LTFs is that it is possible to generate an arbitrary number of lossy tags by means of a special trapdoor, while it is not feasible to produce lossy tags witho
发表于 2025-4-2 04:27:47 | 显示全部楼层
P. E. Dawson,K. G. M. Brockbankirings (DLIN) and lattices (LWE). Our lossy identitybased trapdoor functions provide an automatic way to realize, in the identity-based setting, many functionalities previously known only in the public-key setting. In particular we obtain the first deterministic and efficiently searchable IBE scheme
发表于 2025-4-2 11:03:56 | 显示全部楼层
F. Joyce,J. Tingleff,G. Pettersson MDlates that the output of the hash function looks random on . instances, we require invertibility, which stipulates that the output of the hash function on . instances uniquely determine the hashing key, and moreover, that there is a trapdoor which allows us to efficiently recover the hashing key.
发表于 2025-4-2 14:42:17 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-21 11:32
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表