找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Cryptology; 13th International C Xiaofeng Chen,Dongdai Lin,Moti Yung Conference proceedings 2018 Springer Internat

[复制链接]
楼主: 门牙
发表于 2025-3-26 21:59:42 | 显示全部楼层
Hashing into Twisted Jacobi Intersection Curvess to construct such encodings: (1) utilizing the algorithm of computing cube roots on . when .; (2) using Shallue-Woestijne-Ulas algorithm when .. In both cases, our encoding methods are more efficient than existed ones. Moreover, we estimate the density of images of both encodings by Chebotarev theorem.
发表于 2025-3-27 03:39:35 | 显示全部楼层
发表于 2025-3-27 08:02:35 | 显示全部楼层
发表于 2025-3-27 12:52:11 | 显示全部楼层
发表于 2025-3-27 13:51:56 | 显示全部楼层
A Simpler Bitcoin Voting Protocoldidates. We also redesign a vote casting protocol without threshold signatures to reduce transaction numbers and protocol complexities. We also introduce new polices to make the Bitcoin Voting protocol more fair.
发表于 2025-3-27 18:07:49 | 显示全部楼层
A Universal Designated Multi-Verifier Transitive Signature Scheme(.) scheme. Namely, our new scheme allows a transitive signature holder to designate the signature to multi-verifier. Furthermore, for the proposed scheme, we formalize its security notions and prove its security in the random oracle model. We also analyse the performance of our scheme to demonstrate its efficiency.
发表于 2025-3-27 23:21:26 | 显示全部楼层
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Schemey in the security model. Furthermore, we propose an improved strongly unforgeable IBS scheme without random oracles. Compared with other strongly unforgeable IBS schemes in the standard model, our scheme is more efficient in terms of computation cost and signature size.
发表于 2025-3-28 03:05:02 | 显示全部楼层
0302-9743 ryptology, Inscrypt 2017, held in Xi‘an, China, in November 2017..The 27 revised full papers presented together with 5 keynote speeches were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: cryptographic protocols and algorithms; digita
发表于 2025-3-28 09:07:20 | 显示全部楼层
From Attack on Feige-Shamir to Construction of Oblivious Transfer adversary breaking the .-distributional concurrent zero knowledge of Feige-Shamir protocols over a hard distribution, it can be transformed to an (infinitely-often) distributional witness encryption based on injective one way function.
发表于 2025-3-28 12:13:23 | 显示全部楼层
Security and Privacy in the IoTn different application domains. We then discuss aspects of a roadmap for IoT security and privacy with focus on access control, software and firmware, and intrusion detection systems. We conclude the paper by outlining a few challenges.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-4 19:27
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表