找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Cryptography for Networks; 8th International Co Ivan Visconti,Roberto Prisco Conference proceedings 2012 Springer-Verlag Berli

[复制链接]
楼主: ominous
发表于 2025-3-25 04:29:58 | 显示全部楼层
发表于 2025-3-25 09:50:21 | 显示全部楼层
History-Free Sequential Aggregate Signaturesite compression, some notion of unforgeability is preserved. Recently, Eikemeier et al. (SCN 2010) considered the notion of . sequential aggregation for message authentication codes, where the sequentially-executed aggregation algorithm does not need to receive the previous messages in the sequence
发表于 2025-3-25 15:20:10 | 显示全部楼层
发表于 2025-3-25 16:09:59 | 显示全部楼层
发表于 2025-3-25 22:22:04 | 显示全部楼层
Decentralized Dynamic Broadcast Encryptions the data to the registered users according to a specific policy (the target set), and the users that decrypt the data if they are authorized by the policy. Public-key broadcast encryption can be seen as removing this special role of encryptor, by allowing anybody to send encrypted data. In this pa
发表于 2025-3-26 03:11:18 | 显示全部楼层
Time-Specific Encryption from Forward-Secure Encryptioncryption with additional functionality where an encryptor can specify a suitable time interval, meaning that the ciphertexts may only be decrypted within this time interval. In this work, we propose a new methodology for designing efficient TSE scheme by using forward-secure encryption (FSE), and ba
发表于 2025-3-26 08:04:44 | 显示全部楼层
Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuitsh relies on the . (IT) Garbled Circuit (GC), which is more efficient than Yao’s GC on shallow circuits. When evaluating a large circuit, we “slice” it into thin layers and evaluate them with IT GC. Motivated by the client-server setting, we propose two variants of our construction: one for semi-hone
发表于 2025-3-26 08:59:22 | 显示全部楼层
发表于 2025-3-26 16:08:39 | 显示全部楼层
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocolshonest majority of active adversaries. We present a number of modifications to the protocol; the first reduces the security to covert security, but produces significant performance enhancements; the second enables us to perform bit-wise operations in characteristic two fields. As a bench mark appli
发表于 2025-3-26 18:32:52 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-20 04:54
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表