Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Past month
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
Aug 5, 2024 · Efficient UC Commitment Extension with Homomorphism for Free (and Applications). ASIACRYPT (2) 2019: 606-635. [c30]. view. electronic edition via DOI ...
8 days ago · This technique, better known as distributed encryption, stands out as one of the main alternatives to protect long-term secret keys, alongside encrypting the ...
Aug 20, 2024 · We develop a new construction of a threshold fully homomorphic encryption scheme, with a new property that we call “flexible” ciphertexts.
Aug 16, 2024 · efficient isomorphism between Z` p and Gq, the difficulty of DL, CDH, and DDH are the same in both groups. From a security point of view, Z` p is therefore ...
Aug 17, 2024 · The LLM-twin framework proposed in this paper designs the Mini-Giant model cooperative architecture, which is committed to solving the bottlenecks of resources ...
4 days ago · Threshold cryptography has gained momentum in the last decades as a mechanism to protect long term secret keys. Rather than having a single secret key, ...
6 days ago · We will see how we can modify the technique to produce elementary extensions realizing specific ranked lattices to ensure that such extensions are end, cofinal, ...