找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security; 25th International C Willy Susilo,Xiaofeng Chen,Rolly Intan Conference proceedings 2022 The Editor(s) (if applicable)

[复制链接]
楼主: fibrous-plaque
发表于 2025-3-25 04:50:00 | 显示全部楼层
发表于 2025-3-25 11:23:34 | 显示全部楼层
发表于 2025-3-25 11:58:56 | 显示全部楼层
Daric: A Storage Efficient Payment Channel with Punishment Mechanismoptimal storage and bounded closure. Moreover, Daric implements a punishment mechanism and simultaneously avoids the methods other schemes commonly use to enable punishment: 1) state duplication which leads to exponential increase in the number of transactions with the number of applications on top
发表于 2025-3-25 17:54:37 | 显示全部楼层
Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMsly. ORAM is a good potential approach to carry out this kind of remote operation. In order to use ORAM for this purpose, we still need to have garbled programs to run on ORAM. Goldwasser et al. and Lu-Ostrovsky initiated the study of garbled RAM machines in their 2013 Crypto papers. Goldwasser et al
发表于 2025-3-25 20:12:00 | 显示全部楼层
Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Settingcompute the cardinality of the intersection without leaking anything more to the other party. It’s one of the best-studied applications of secure computation, and many PSI-CA protocols in balanced or unbalanced scenarios have been proposed. Generally, unbalanced scenario means that the private set s
发表于 2025-3-26 01:22:32 | 显示全部楼层
发表于 2025-3-26 04:52:01 | 显示全部楼层
Witness Encryption from Smooth Projective Hashing Systemhic primitives. The former can produce a hash value corresponding to an . language instance in two ways, and the latter allows encrypting a message using the description of an instance in an . language. Mostly, witness encryption is constructed using computationally expensive tools like multilinear
发表于 2025-3-26 10:05:05 | 显示全部楼层
More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Modelther two ciphertexts are encryption of the same plaintext. Although several lattice-based IBEET schemes have been proposed, they have drawbacks in either security or efficiency. Specifically, most schemes satisfy only selective security, while adaptively secure schemes in the standard model suffer f
发表于 2025-3-26 14:45:21 | 显示全部楼层
发表于 2025-3-26 18:23:24 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 07:30
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表