找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Theoretic Security; 7th International Co Carles Padró Conference proceedings 2014 Springer International Publishing Switzerland

[复制链接]
楼主: 重婚
发表于 2025-3-28 18:10:47 | 显示全部楼层
发表于 2025-3-28 21:59:25 | 显示全部楼层
Ivan Damgård,Jakob Funder,Jesper Buus Nielsen,Louis Salvail
发表于 2025-3-28 23:44:20 | 显示全部楼层
发表于 2025-3-29 03:06:06 | 显示全部楼层
发表于 2025-3-29 11:19:19 | 显示全部楼层
Insider-Proof Encryption with Applications for Quantum Key Distribution,o an outside adversary when devices are used repeatedly. We show how to use the insider-proof private channel to allow DIQKD protocols to reuse devices any desired number of times without leaking information.
发表于 2025-3-29 13:14:33 | 显示全部楼层
发表于 2025-3-29 16:26:57 | 显示全部楼层
Overcoming Weak Expectations via the R,nyi Entropy and the Expanded Computational Entropy, We achieve these results via employing the discrete form of the H.lder inequality. We also use some techniques to guarantee that the expanded computational entropy is useful in the security model. Thus our results are more general, and we also obtain some results from a computational perspective. T
发表于 2025-3-29 22:00:03 | 显示全部楼层
Modulus Computational Entropy,definition of the computational entropy, which we call the ., and use it as a technical tool that allows us to prove a desired chain rule that depends only on the actual leakage and not on its history. Moreover, we show that the modulus computational entropy unifies other, sometimes seemingly unrela
发表于 2025-3-30 03:24:45 | 显示全部楼层
Broadcast (and Round) Efficient Verifiable Secret Sharing, a refinement of the round complexity of VSS, by adding a measure we term .. We view the broadcast channel as an expensive resource and seek to minimize the number of rounds in which it is invoked as well..We construct a (linear) VSS protocol which uses the broadcast channel only . in the sharing ph
发表于 2025-3-30 05:47:31 | 显示全部楼层
,Leakage Resilience of the Blom’s Key Distribution Scheme,can (1) compromise completely some nodes in a “standard” way, and (2) leak information . from the remaining nodes. The amount leakage that we can tolerate can be up to . of the total amount of information on the leaking nodes. We also show that this bound is optimal, by providing an attack that brea
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-22 22:33
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表