Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Any time
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
Verbatim
Mar 2, 2022 · Abstract. Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult due to the adversary's power to ...
Jan 25, 2023 · Role Assignment: At the core of protocols in the YOSO model is a scheme for encrypting messages towards roles rather than parties. A party ...
... The proposed driver drowsiness monitoring system employs the YOLO architecture, which divides images into a grid network for object detection (Figure 2).
Jan 25, 2023 · Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult due to the adversary's power to dynamically ...
Jan 23, 2023 · YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model. Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring.
In this work we design schemes for role assignment that are not only efficient in sending messages to parties selected in the future but also amenable to the ...
TL;DR: In this paper , the authors proposed a simple and efficient scheme for encrypting messages towards randomly and anonymously selected parties, and ...
Inspired by the work of Benhamouda et al. in TCC 2020, Gentry et al. in CRYPTO 2021 introduced the YOSO (You Only Speak Once) model for constructing adaptively ...
Ignacio Cascudo, Bernardo David. Publicly Verifiable Secret Sharing Over Class Groups and Applications to DKG and YOSO. Advances in Cryptology - EUROCRYPT 2024 ...