找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security and Cryptology; 19th International C Chunpeng Ge,Moti Yung Conference proceedings 2024 The Editor(s) (if applicable) a

[复制链接]
楼主: COAX
发表于 2025-3-28 17:48:15 | 显示全部楼层
Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Ped alongside other secure components within a complex blockchain system to achieve various security objectives. However, achieving security of a comprehensive system requires additional analysis on the entire system, considering mutual impacts among protocols. Hence, it is crucial to introduce a uni
发表于 2025-3-28 21:04:04 | 显示全部楼层
Compact Ring Signatures with Post-Quantum Security in Standard Modelntially unforgeable under a chosen message attack (EUF-CMA) secure signature into a BU secure signature. Hence, through our work, one can easily build a compact post-quantum ring signature in the standard model directly from any EUF-CMA secure signature.
发表于 2025-3-29 03:00:01 | 显示全部楼层
发表于 2025-3-29 06:26:32 | 显示全部楼层
Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryptiones a homomorphic one-way function to encrypt a payment path that satisfies the sender’s requirements, and the results in hiding path information such as the identity of the nodes in this path. This ensures that the sender does not steal information about the payment path in advance of adopting the p
发表于 2025-3-29 07:37:25 | 显示全部楼层
A General Federated Learning Scheme with Blockchain on Non-IID DataThe scheme achieves effective training of models while ensuring security. Experimental results show that the proposed scheme can speed up model convergence and improve the model’s accuracy simultaneously. In the non-IID scenario, compared with the federated learning benchmark scheme, the accuracy in
发表于 2025-3-29 14:41:05 | 显示全部楼层
A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservationine-grained controllable PHR sharing. In addition, the blockchain-based proxy re-encryption method can protect the confidentiality of PHR and prevent privacy leakage. Security analysis shows that our scheme achieves the expected security goals. Besides, we evaluated the proposed scheme on Hyperledge
发表于 2025-3-29 19:08:56 | 显示全部楼层
发表于 2025-3-29 21:38:06 | 显示全部楼层
Full Domain Functional Bootstrapping with Least Significant Bit Encoding can evaluate arbitrary functions. In addition, our technique can be applied to multi-value bootstrapping and tree-based bootstrapping. Thus, these algorithms only need one FBS to achieve the full domain property..Finally, we implement our full domain functional bootstrapping in the OpenFHE cryptogr
发表于 2025-3-30 01:44:39 | 显示全部楼层
发表于 2025-3-30 06:51:55 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-21 16:28
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表