找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Cryptology; 19th International C Chunpeng Ge,Moti Yung Conference proceedings 2024 The Editor(s) (if applicable) a

[復(fù)制鏈接]
樓主: COAX
21#
發(fā)表于 2025-3-25 04:27:58 | 只看該作者
TVES: Threshold Verifiably Encrypted Signature and?Its Applicationsator, a trusted third party, to keep the signature a secret but verifiable. The ordinary signature can be revealed at a later stage. In this paper, we propose Threshold Verifiably Encrypted Signature (TVES), which applies threshold cryptography to both signer and adjudicator parties to decentralize
22#
發(fā)表于 2025-3-25 09:03:22 | 只看該作者
23#
發(fā)表于 2025-3-25 14:31:21 | 只看該作者
Universally Composable Key-Insulated and?Privacy-Preserving Signature Scheme with?Publicly Derived Pin the blockchain community. One widely adopted technique for privacy preservation is the use of Stealth Address, which serves as a crucial component of Monero’s Ring Confidential Transaction (RingCT) protocol. Liu et al. (EuroS &P’19) introduced and formalized a new signature variant called the Key
24#
發(fā)表于 2025-3-25 19:00:22 | 只看該作者
Compact Ring Signatures with Post-Quantum Security in Standard Modelntum ring signatures with post-quantum anonymity and post-quantum blind-unforgeability. Assuming the hardness of the learning with errors problem, they proposed a generic construction that transforms any blind-unforgeable (BU) secure signature into a post-quantum ring signature in the standard model
25#
發(fā)表于 2025-3-25 21:01:58 | 只看該作者
Secure Multi-party SM2 Signature Based on?SPDZ Protocolo two-party or even multi-party and multi-device scenarios. To meet the needs of multi-party signature scenarios, we propose a multi-party SM2 signature scheme based on SPDZ protocol. The basic signature scheme used in this paper is the SM2 digital signature algorithm in the standard “SM2 Elliptic C
26#
發(fā)表于 2025-3-26 03:27:49 | 只看該作者
Epoch: Enabling Path Concealing Payment Channel Hubs with?Optimal Path Encryptionainst the victim node, resulting in the victim node’s available balance being fully locked in the recurring transaction, thereby increasing the cost of collateral due to the longer lock time. The current solution primarily focuses on hiding the balance. However, it is not resistant to LockDown attac
27#
發(fā)表于 2025-3-26 07:36:06 | 只看該作者
A General Federated Learning Scheme with?Blockchain on?Non-IID Datals in machine learning via local training and parameter interactions of participants. However, participants’ data usually shows significant differences, ., the characteristics of non-IID, affecting the convergence speed and accuracy of models to a large extent. In this paper, we propose a general fe
28#
發(fā)表于 2025-3-26 10:49:38 | 只看該作者
29#
發(fā)表于 2025-3-26 13:20:30 | 只看該作者
30#
發(fā)表于 2025-3-26 18:29:26 | 只看該作者
Geometry-Based Garbled Circuits Relying Solely on?One Evaluation Algorithm Under Standard Assumptionircuits (GC) utilize 4 ciphertexts per gate which have attracted great attention for optimizing the performance of communication. Under standard assumption, the best existing optimizations on GC have reduced the number of ciphertexts per gate to 2, while other more efficient optimizations rely on th
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-29 12:05
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
吉安县| 汉源县| 凌源市| 建平县| 崇左市| 康马县| 广德县| 宽甸| 宜昌市| 宁河县| 嘉禾县| 正镶白旗| 建湖县| 来宾市| 根河市| 水富县| 定襄县| 内黄县| 葫芦岛市| 平乐县| 阜平县| 宜黄县| 延长县| 九龙城区| 自治县| 峡江县| 阿克陶县| 遂川县| 枣阳市| 焉耆| 英德市| 凤冈县| 临潭县| 沾化县| 阳信县| 区。| 凤阳县| 八宿县| 眉山市| 浙江省| 建水县|