找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; 19th International C Sihan Qing,Chris Mitchell,Dongmei Liu Conference proceedings 2018 Springer Na

[复制链接]
楼主: 快乐
发表于 2025-3-28 17:18:45 | 显示全部楼层
Towards Tightly Secure Deterministic Public Key Encryption can be tightly PRIV-IND-.-CCA secure. Finally, we prove that the all-but-. TDF given by Hemenway et al. is tightly secure, which results in the first tightly PRIV-IND-.-CCA secure D-PKE scheme for block-sources, based on the .-DCR assumption.
发表于 2025-3-28 19:40:12 | 显示全部楼层
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials Systemolic model using applied pi calculus, which is suitable for automated reasoning via formal analysis tools. We model the definitions of some common security properties: authenticity, non-framebility, mis-authentication resistance and privacy (anonymity and unlinkability). The case study of these secu
发表于 2025-3-29 00:14:48 | 显示全部楼层
发表于 2025-3-29 04:35:30 | 显示全部楼层
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structureir medical data frequently and have to sign these medical data from scratch after updating. Besides, traditional signature attests the identity of the individual signing the records, which leads to vast computation cost and the privacy leakage. In this paper, we obfuscate users identity information
发表于 2025-3-29 08:14:07 | 显示全部楼层
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OSecure private keys – some of them employ extra specific hardware devices while most of them adopt security features provided by general OS. However, users are reluctant to extra devices and general OS is too complicated to protect itself, let alone the private keys on it. This paper proposes a softw
发表于 2025-3-29 14:18:07 | 显示全部楼层
The Reductions for the Approximating Covering Radius Problem-preserving reduction from approximating . to . (Covering Bounded Distance Decoding Problem). Furthermore, we show that there are polynomial-time reductions from . to approximating . (Closest Vector Problem) and . (Shortest Independent Vector Problem), respectively. Hence, . reduces to . and . under
发表于 2025-3-29 17:37:13 | 显示全部楼层
Distributed Pseudorandom Functions for General Access Structures in NP computation is distributed to multiple servers. Although by distributing the function computation, we avoid single points of failures, this distribution usually implies the need for multiple interactions with the parties (servers) involved in the computation of the function. In this paper, we take
发表于 2025-3-29 21:30:31 | 显示全部楼层
Reducing Randomness Complexity of Mask Refreshing Algorithmxes), each basic operation of the function should be replaced with the .-th order secure operation. In this process, the multiplication with dependent inputs always exists, which may lead to security bias. In order to preserve the security of the dependent-input multiplication, a refreshing algorith
发表于 2025-3-30 03:44:14 | 显示全部楼层
A Plausibly Deniable Encryption Scheme Utilizing PUF’s Thermo-Sensitivityr random parameters. However, current deniable encryption schemes or techniques either require the user to remember some tedious random parameters used in encryption or demand special designs in the file system. Any abnormality in the user’s behavior or in the file system tend to arouse suspicion, t
发表于 2025-3-30 06:44:44 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-23 16:32
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表