找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Cryptology; 19th International C Chunpeng Ge,Moti Yung Conference proceedings 2024 The Editor(s) (if applicable) a

[復(fù)制鏈接]
樓主: COAX
21#
發(fā)表于 2025-3-25 04:27:58 | 只看該作者
TVES: Threshold Verifiably Encrypted Signature and?Its Applicationsator, a trusted third party, to keep the signature a secret but verifiable. The ordinary signature can be revealed at a later stage. In this paper, we propose Threshold Verifiably Encrypted Signature (TVES), which applies threshold cryptography to both signer and adjudicator parties to decentralize
22#
發(fā)表于 2025-3-25 09:03:22 | 只看該作者
23#
發(fā)表于 2025-3-25 14:31:21 | 只看該作者
Universally Composable Key-Insulated and?Privacy-Preserving Signature Scheme with?Publicly Derived Pin the blockchain community. One widely adopted technique for privacy preservation is the use of Stealth Address, which serves as a crucial component of Monero’s Ring Confidential Transaction (RingCT) protocol. Liu et al. (EuroS &P’19) introduced and formalized a new signature variant called the Key
24#
發(fā)表于 2025-3-25 19:00:22 | 只看該作者
Compact Ring Signatures with Post-Quantum Security in Standard Modelntum ring signatures with post-quantum anonymity and post-quantum blind-unforgeability. Assuming the hardness of the learning with errors problem, they proposed a generic construction that transforms any blind-unforgeable (BU) secure signature into a post-quantum ring signature in the standard model
25#
發(fā)表于 2025-3-25 21:01:58 | 只看該作者
Secure Multi-party SM2 Signature Based on?SPDZ Protocolo two-party or even multi-party and multi-device scenarios. To meet the needs of multi-party signature scenarios, we propose a multi-party SM2 signature scheme based on SPDZ protocol. The basic signature scheme used in this paper is the SM2 digital signature algorithm in the standard “SM2 Elliptic C
26#
發(fā)表于 2025-3-26 03:27:49 | 只看該作者
Epoch: Enabling Path Concealing Payment Channel Hubs with?Optimal Path Encryptionainst the victim node, resulting in the victim node’s available balance being fully locked in the recurring transaction, thereby increasing the cost of collateral due to the longer lock time. The current solution primarily focuses on hiding the balance. However, it is not resistant to LockDown attac
27#
發(fā)表于 2025-3-26 07:36:06 | 只看該作者
A General Federated Learning Scheme with?Blockchain on?Non-IID Datals in machine learning via local training and parameter interactions of participants. However, participants’ data usually shows significant differences, ., the characteristics of non-IID, affecting the convergence speed and accuracy of models to a large extent. In this paper, we propose a general fe
28#
發(fā)表于 2025-3-26 10:49:38 | 只看該作者
29#
發(fā)表于 2025-3-26 13:20:30 | 只看該作者
30#
發(fā)表于 2025-3-26 18:29:26 | 只看該作者
Geometry-Based Garbled Circuits Relying Solely on?One Evaluation Algorithm Under Standard Assumptionircuits (GC) utilize 4 ciphertexts per gate which have attracted great attention for optimizing the performance of communication. Under standard assumption, the best existing optimizations on GC have reduced the number of ciphertexts per gate to 2, while other more efficient optimizations rely on th
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-29 12:05
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
永城市| 虎林市| 麻栗坡县| 黄山市| 周至县| 尉犁县| 德清县| 新泰市| 乌拉特中旗| 湄潭县| 成武县| 乐安县| 朝阳县| 阿图什市| 宁安市| 金坛市| 讷河市| 新巴尔虎右旗| 元朗区| 平果县| 新乐市| 江门市| 吉木乃县| 大方县| 滦平县| 哈尔滨市| 五峰| 海林市| 桐柏县| 千阳县| 稷山县| 从化市| 改则县| 丰宁| 武义县| 荆州市| 隆安县| 无棣县| 平潭县| 汝州市| 秭归县|