找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security and Cryptography for Networks; 11th International C Dario Catalano,Roberto De Prisco Conference proceedings 2018 Springer Nature S

[复制链接]
楼主: 自由
发表于 2025-3-25 06:06:08 | 显示全部楼层
A Constructive Perspective on Signcryption Securityon without the need of prior key agreement. Instead, a party registers its public key at a certificate authority (CA), and only needs to retrieve the public key of the intended partner from the CA before being able to protect the communication. Signcryption schemes provide both authenticity and conf
发表于 2025-3-25 09:47:23 | 显示全部楼层
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keysresult improves upon the work of Boneh, Gentry and Waters (Crypto ’05) as well as several recent follow-ups (TCC ’16-A, Asiacrypt ’16) in two ways: (i) we achieve adaptive security instead of selective security, and (ii) our construction relies on the decisional .-Linear Assumption in prime-order gr
发表于 2025-3-25 12:26:40 | 显示全部楼层
发表于 2025-3-25 16:36:11 | 显示全部楼层
Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWRlems and the lightweight operations for generating its instances. The PKE schemes based on the LWE problem have a simple and fast decryption, but the encryption phase requires large parameter size for the leftover hash lemma or Gaussian samplings..In this paper, we propose a novel PKE scheme, called
发表于 2025-3-25 23:20:07 | 显示全部楼层
发表于 2025-3-26 02:57:23 | 显示全部楼层
Proactive Secure Multiparty Computation with a Dishonest Majoritytiality of inputs (and outputs, if desired) and correctness of the computation, as long as no adversary corrupts more than a threshold . of the . parties. Existing MPC protocols assure perfect security for . active corruptions with termination (i.e., robustness), or up to . under cryptographic assum
发表于 2025-3-26 08:08:34 | 显示全部楼层
发表于 2025-3-26 10:01:52 | 显示全部楼层
Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filtersthat guarantees both correctness and privacy. This secure computation task is of great importance and usability in many different real-life scenarios. Much research was dedicated to the construction of PSI-tailored concretely efficient protocols for the case of two-party PSI. The case of many partie
发表于 2025-3-26 14:43:16 | 显示全部楼层
Semantically Secure Anonymity: Foundations of Re-encryptionertext without changing its size, without first decrypting it, and without knowing who the receiver is (i.e., not knowing the public key used to create it). By design it prevents the randomized ciphertext from being correlated with the original ciphertext. We revisit and analyze the security foundat
发表于 2025-3-26 16:53:00 | 显示全部楼层
Unforgeable Watermarking Schemes with Public Extractionprogram, one must communicate with a third party. This greatly limits the applicability of current watermarking schemes. In this paper, we solve this problem by presenting the first (stateless) publicly extractable watermarking scheme with unremovability and unforgeability.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-17 16:07
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表