找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Cryptology; 19th International C Chunpeng Ge,Moti Yung Conference proceedings 2024 The Editor(s) (if applicable) a

[復制鏈接]
樓主: COAX
41#
發(fā)表于 2025-3-28 17:48:15 | 只看該作者
Universally Composable Key-Insulated and?Privacy-Preserving Signature Scheme with?Publicly Derived Ped alongside other secure components within a complex blockchain system to achieve various security objectives. However, achieving security of a comprehensive system requires additional analysis on the entire system, considering mutual impacts among protocols. Hence, it is crucial to introduce a uni
42#
發(fā)表于 2025-3-28 21:04:04 | 只看該作者
Compact Ring Signatures with Post-Quantum Security in Standard Modelntially unforgeable under a chosen message attack (EUF-CMA) secure signature into a BU secure signature. Hence, through our work, one can easily build a compact post-quantum ring signature in the standard model directly from any EUF-CMA secure signature.
43#
發(fā)表于 2025-3-29 03:00:01 | 只看該作者
44#
發(fā)表于 2025-3-29 06:26:32 | 只看該作者
Epoch: Enabling Path Concealing Payment Channel Hubs with?Optimal Path Encryptiones a homomorphic one-way function to encrypt a payment path that satisfies the sender’s requirements, and the results in hiding path information such as the identity of the nodes in this path. This ensures that the sender does not steal information about the payment path in advance of adopting the p
45#
發(fā)表于 2025-3-29 07:37:25 | 只看該作者
A General Federated Learning Scheme with?Blockchain on?Non-IID DataThe scheme achieves effective training of models while ensuring security. Experimental results show that the proposed scheme can speed up model convergence and improve the model’s accuracy simultaneously. In the non-IID scenario, compared with the federated learning benchmark scheme, the accuracy in
46#
發(fā)表于 2025-3-29 14:41:05 | 只看該作者
A Blockchain-Based Personal Health Record Sharing Scheme with?Security and?Privacy Preservationine-grained controllable PHR sharing. In addition, the blockchain-based proxy re-encryption method can protect the confidentiality of PHR and prevent privacy leakage. Security analysis shows that our scheme achieves the expected security goals. Besides, we evaluated the proposed scheme on Hyperledge
47#
發(fā)表于 2025-3-29 19:08:56 | 只看該作者
48#
發(fā)表于 2025-3-29 21:38:06 | 只看該作者
Full Domain Functional Bootstrapping with?Least Significant Bit Encoding can evaluate arbitrary functions. In addition, our technique can be applied to multi-value bootstrapping and tree-based bootstrapping. Thus, these algorithms only need one FBS to achieve the full domain property..Finally, we implement our full domain functional bootstrapping in the OpenFHE cryptogr
49#
發(fā)表于 2025-3-30 01:44:39 | 只看該作者
50#
發(fā)表于 2025-3-30 06:51:55 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-29 15:35
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
稻城县| 巴马| 乌鲁木齐市| 县级市| 山西省| 永昌县| 柳江县| 惠来县| 永定县| 大余县| 泊头市| 贵阳市| 钟山县| 连云港市| 九江市| 广昌县| 安西县| 南木林县| 栾川县| 夏河县| 府谷县| 云林县| 湟中县| 朔州市| 麻江县| 司法| 和平县| 三原县| 台中市| 东辽县| 花垣县| 蓝山县| 紫金县| 安庆市| 钟祥市| 普宁市| 宁德市| 忻州市| 宜阳县| 五寨县| 泽库县|