找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Cryptology; 19th International C Chunpeng Ge,Moti Yung Conference proceedings 2024 The Editor(s) (if applicable) a

[復(fù)制鏈接]
樓主: COAX
21#
發(fā)表于 2025-3-25 04:27:58 | 只看該作者
TVES: Threshold Verifiably Encrypted Signature and?Its Applicationsator, a trusted third party, to keep the signature a secret but verifiable. The ordinary signature can be revealed at a later stage. In this paper, we propose Threshold Verifiably Encrypted Signature (TVES), which applies threshold cryptography to both signer and adjudicator parties to decentralize
22#
發(fā)表于 2025-3-25 09:03:22 | 只看該作者
23#
發(fā)表于 2025-3-25 14:31:21 | 只看該作者
Universally Composable Key-Insulated and?Privacy-Preserving Signature Scheme with?Publicly Derived Pin the blockchain community. One widely adopted technique for privacy preservation is the use of Stealth Address, which serves as a crucial component of Monero’s Ring Confidential Transaction (RingCT) protocol. Liu et al. (EuroS &P’19) introduced and formalized a new signature variant called the Key
24#
發(fā)表于 2025-3-25 19:00:22 | 只看該作者
Compact Ring Signatures with Post-Quantum Security in Standard Modelntum ring signatures with post-quantum anonymity and post-quantum blind-unforgeability. Assuming the hardness of the learning with errors problem, they proposed a generic construction that transforms any blind-unforgeable (BU) secure signature into a post-quantum ring signature in the standard model
25#
發(fā)表于 2025-3-25 21:01:58 | 只看該作者
Secure Multi-party SM2 Signature Based on?SPDZ Protocolo two-party or even multi-party and multi-device scenarios. To meet the needs of multi-party signature scenarios, we propose a multi-party SM2 signature scheme based on SPDZ protocol. The basic signature scheme used in this paper is the SM2 digital signature algorithm in the standard “SM2 Elliptic C
26#
發(fā)表于 2025-3-26 03:27:49 | 只看該作者
Epoch: Enabling Path Concealing Payment Channel Hubs with?Optimal Path Encryptionainst the victim node, resulting in the victim node’s available balance being fully locked in the recurring transaction, thereby increasing the cost of collateral due to the longer lock time. The current solution primarily focuses on hiding the balance. However, it is not resistant to LockDown attac
27#
發(fā)表于 2025-3-26 07:36:06 | 只看該作者
A General Federated Learning Scheme with?Blockchain on?Non-IID Datals in machine learning via local training and parameter interactions of participants. However, participants’ data usually shows significant differences, ., the characteristics of non-IID, affecting the convergence speed and accuracy of models to a large extent. In this paper, we propose a general fe
28#
發(fā)表于 2025-3-26 10:49:38 | 只看該作者
29#
發(fā)表于 2025-3-26 13:20:30 | 只看該作者
30#
發(fā)表于 2025-3-26 18:29:26 | 只看該作者
Geometry-Based Garbled Circuits Relying Solely on?One Evaluation Algorithm Under Standard Assumptionircuits (GC) utilize 4 ciphertexts per gate which have attracted great attention for optimizing the performance of communication. Under standard assumption, the best existing optimizations on GC have reduced the number of ciphertexts per gate to 2, while other more efficient optimizations rely on th
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-29 09:55
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
陇川县| 治县。| 北海市| 行唐县| 永清县| 紫金县| 积石山| 涿鹿县| 玛曲县| 天等县| 台北市| 兴化市| 六枝特区| 光山县| 容城县| 九江县| 浑源县| 阳信县| 托克逊县| 甘洛县| 莫力| 宁海县| 墨玉县| 安福县| 景洪市| 宣汉县| 玛曲县| 泸定县| 神农架林区| 梓潼县| 修文县| 且末县| 肃南| 思南县| 安阳县| 长垣县| 峡江县| 沈阳市| 长汀县| 惠来县| 通山县|