找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Theoretic Security; 6th International Co Adam Smith Conference proceedings 2012 Springer-Verlag Berlin Heidelberg 2012 encrypti

[復(fù)制鏈接]
查看: 23335|回復(fù): 44
樓主
發(fā)表于 2025-3-21 18:52:51 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱Information Theoretic Security
副標(biāo)題6th International Co
編輯Adam Smith
視頻videohttp://file.papertrans.cn/466/465744/465744.mp4
概述Up-to-date results.Fast-track conference proceedings.State-of-the-art research
叢書(shū)名稱Lecture Notes in Computer Science
圖書(shū)封面Titlebook: Information Theoretic Security; 6th International Co Adam Smith Conference proceedings 2012 Springer-Verlag Berlin Heidelberg 2012 encrypti
描述This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels; bounded-storage models; information-theoretic reductions; quantum cryptography; quantum information theory; nonlocality and nonsignaling; key and message rates; secret sharing; physical models and assumptions; network coding security; adversarial channel models; information-theoretic tools in computational settings; implementation challenges; and biometric security.
出版日期Conference proceedings 2012
關(guān)鍵詞encryption; information theory; oblivious affine function evaluation; privacy; zero knowledge protocols
版次1
doihttps://doi.org/10.1007/978-3-642-32284-6
isbn_softcover978-3-642-32283-9
isbn_ebook978-3-642-32284-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2012
The information of publication is updating

書(shū)目名稱Information Theoretic Security影響因子(影響力)




書(shū)目名稱Information Theoretic Security影響因子(影響力)學(xué)科排名




書(shū)目名稱Information Theoretic Security網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Information Theoretic Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Information Theoretic Security被引頻次




書(shū)目名稱Information Theoretic Security被引頻次學(xué)科排名




書(shū)目名稱Information Theoretic Security年度引用




書(shū)目名稱Information Theoretic Security年度引用學(xué)科排名




書(shū)目名稱Information Theoretic Security讀者反饋




書(shū)目名稱Information Theoretic Security讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

1票 100.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:31:49 | 只看該作者
Trading Robustness for Correctness and Privacy in Certain Multiparty Computations, beyond an Honestcial case of the computation of the . function over binary inputs in the secure channels model with a . broadcast channel. This simple function is a useful building block for other applications. The classical results in multiparty computation show that in this model, every function can be computed w
板凳
發(fā)表于 2025-3-22 04:04:24 | 只看該作者
地板
發(fā)表于 2025-3-22 07:57:11 | 只看該作者
On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations, from a finite field. For error probability 2. the size of the proof is linear in . and only logarithmic in .. Therefore, for any fixed error probability, the amortized complexity vanishes as we increase .. In particular, when the committed values are from a field of small constant size, we improve
5#
發(fā)表于 2025-3-22 09:53:36 | 只看該作者
6#
發(fā)表于 2025-3-22 13:26:54 | 只看該作者
Shannon Impossibility, Revisited,d attackers must have a secret key as long as the message. This result motivated the introduction of modern encryption schemes, which are secure only against a computationally bounded attacker, and allow some small (negligible) advantage to such an attacker. It is a well known folklore that both suc
7#
發(fā)表于 2025-3-22 19:01:08 | 只看該作者
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation,a designated sender party can specify an arbitrary affine function ., such that a designated receiver party learns .(.) for a single argument . of its choice. This primitive is of particular interest, since analogously to the construction of garbled boolean circuits based on OT one can construct gar
8#
發(fā)表于 2025-3-22 23:24:18 | 只看該作者
9#
發(fā)表于 2025-3-23 05:07:15 | 只看該作者
10#
發(fā)表于 2025-3-23 09:10:24 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-2-7 02:00
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
恭城| 吉木萨尔县| 馆陶县| 辉县市| 商丘市| 德化县| 南乐县| 安达市| 连城县| 柯坪县| 北海市| 比如县| 奎屯市| 会昌县| 景泰县| 晋宁县| 河南省| 泽州县| 莱芜市| 蓬溪县| 龙泉市| 洪湖市| 江都市| 常德市| 娱乐| 吉林省| 郁南县| 修文县| 淳安县| 腾冲县| 泊头市| 延吉市| 神池县| 广丰县| 双鸭山市| 顺义区| 宜春市| 五家渠市| 宜城市| 五莲县| 巢湖市|