找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Theoretic Security; 9th International Co Anderson C.A. Nascimento,Paulo Barreto Conference proceedings 2016 Springer Internatio

[复制链接]
楼主: ergonomics
发表于 2025-3-30 10:47:18 | 显示全部楼层
发表于 2025-3-30 15:02:41 | 显示全部楼层
Detecting Algebraic Manipulation in Leaky Storage Systemsthe adversary. We study AMD codes when the storage can leak up to . bits of information about the stored codeword, where . is the group that contains the codeword and . is a constant. We propose .-AMD codes that provide protection in this new setting. We define weak and strong .-AMD codes that provi
发表于 2025-3-30 17:41:53 | 显示全部楼层
Cheater Detection in SPDZ Multiparty Computationumber of dishonest parties. The SPDZ protocol is distinguished by its fast performance. A downside of the SPDZ protocol is that . can enforce the computation to fail, meaning that the honest parties have to . the computation without learning the outcome, whereas the cheating party may actually learn
发表于 2025-3-30 23:56:48 | 显示全部楼层
Error-Correcting Codes Against Chosen-Codeword Attacks introduce a .-fraction of errors by accessing to the encoding and the decoding oracles. Since the unique decoding is not possible for ., we consider list-decodable codes. We present an optimal-rate coding scheme by assuming the existence of one-way functions. The construction is based on the list-d
发表于 2025-3-31 04:26:25 | 显示全部楼层
Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)sent a new kind of commitment scheme on which we can build a novel and efficient zero-knowledge protocol for circuit satisfiability. Our commitment scheme can be constructed in a black-box manner from any commitment scheme. We can prove knowledge of the AES-key which map a particular plaintext to a
发表于 2025-3-31 08:06:22 | 显示全部楼层
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustnesse access control for handling entities who can use the data. . can partially provide such flexibility by specifying privileged receivers so that only they can decrypt a ciphertext. However, once privileged receivers are specified, they can be no longer dynamically added and/or removed. In this paper
发表于 2025-3-31 12:59:32 | 显示全部楼层
发表于 2025-3-31 17:06:42 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 09:49
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表