找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advances in Cryptology – EUROCRYPT ‘94; Workshop on the Theo Alfredo Santis Conference proceedings 1995 Springer-Verlag Berlin Heidelberg 1

[复制链接]
楼主: Jejunum
发表于 2025-3-28 16:14:19 | 显示全部楼层
发表于 2025-3-28 19:49:02 | 显示全部楼层
0302-9743 echniques, EUROCRYPT ‘94, held in Perugia, Italy in May 1994..The 36 revised full papers presented in the book are selected from 137 submissions and address all current research and advanced applicational aspects of cryptography; in addition, there are 11 short papers originating from the best speci
发表于 2025-3-29 00:12:38 | 显示全部楼层
Case Studies in Forensic Epidemiologye to cooperate to generate a valid group signature and suspected forgery implies traceability of adversarial shareholders. The validity of that signature for the specific group can be verified without knowing the membership of the signers to that group.
发表于 2025-3-29 04:07:59 | 显示全部楼层
发表于 2025-3-29 10:00:25 | 显示全部楼层
Laura Bigliardi,Giuliano Sansebastianoealized as information rate by means of the generalized vector space construction. If so, the algorithm produces a perfect secret sharing scheme with this information rate. As a side-result we show a correspondence between the duality of access structures and the duality of codes.
发表于 2025-3-29 13:41:41 | 显示全部楼层
发表于 2025-3-29 15:57:34 | 显示全部楼层
Case Studies in Forensic Epidemiologyvariant of the DSA requires computing of inverses in both generation and verification of signatures. In [9] two applications of message recovery were proposed. In the present paper it is shown how to combine ElGamal encryption and the message recovery scheme of [9] and how to securely integrate the DSA into Diffie-Hellman key exchange.
发表于 2025-3-29 21:38:25 | 显示全部楼层
Antonis Skilourakis,Elefteria Psillakising scheme must give some participant a share which is at least about ./log . times the secret size. We also show that the best possible result achievable by the information theoretic method used here is . times the secret size.
发表于 2025-3-30 00:46:01 | 显示全部楼层
Case Studies in Forensic Epidemiologyparties can confirm the signature without the signer. But the signer is protected, since unless sufficient designated parties cooperate in confirmation, the signature is no more convincing than any other number.
发表于 2025-3-30 07:44:53 | 显示全部楼层
Case Studies in Forensic Epidemiologyadversary can create ciphertexts only of strings for which she “knows” the corresponding plaintexts—such a scheme is not only semantically secure but also non-malleable and secure against chosen-ciphertext attack.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 04:59
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表