Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Any time
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
Verbatim
Mar 2, 2022 · Abstract. Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult due to the adversary's power to ...
Jan 25, 2023 · In this work we address the issue of constructing simple ECW schemes amenable to efficient publicly verifiable secret (re)sharing (PVSS) ...
Inspired by the work of Benhamouda et al. in TCC 2020, Gentry et al. in CRYPTO 2021 introduced the YOSO (You Only Speak Once) model for constructing adaptively ...
Abstract: Achieving adaptive (or proactive) security in cryptographic protocols is notoriously difficult due to the adversary's power to dynamically corrupt ...
However, a big challenge remains in realizing YOSO protocols: efficiently encrypting messages towards anonymous parties selected at random without learning ...
Jan 23, 2023 · YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model. Ignacio Cascudo, Bernardo David, Lydia Garms, Anders Konring.
TL;DR: In this paper , the authors proposed a simple and efficient scheme for encrypting messages towards randomly and anonymously selected parties, and ...
In this work we design schemes for role assignment that are not only efficient in sending messages to parties selected in the future but also amenable to the ...
YOLO YOSO: Fast and Simple Encryption and Secret Sharing in the YOSO Model ... YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model.