Leakage Resilient Cheating Detectable Secret Sharing Schemes

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACISP (26. : 2021 : Online) Information Security and Privacy
1. Verfasser: Dutta, Sabyasachi (VerfasserIn)
Weitere Verfasser: Safavi-Naini, Reihaneh (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Leakage Resilient Cheating Detectable Secret Sharing Schemes 2021 Dutta, Sabyasachi
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF 2021 Pal, Tapas
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers 2021 ElSheikh, Muhammad
CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption 2021 Pal, Tapas
ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism 2021 Chen, Jikun
Non-interactive, Secure Verifiable Aggregation for Decentralize Privacy-Preserving Leaming 2021 Brunetta, Carlo
Oriole: Thwarting Privacy Against Trustworthy Deep Leaming Models 2021 Chen, Liuqiao
Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition 2021 Zong, Wei
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count 2021 Li, Xiaodan
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme 2021 Blazy, Olivier
Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PC 2021 Tsuchida, Hikaru
Optimal Randomized Partial Checking for Decryption Mix Nets 2021 Haines, Thomas
Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE 2021 Zhang, Zongyang
Transparency or Anonymity Leak: Monero Mining Pools Data Publication 2021 Wijaya, Dimaz Ankaa
Puncturable Identity-Based Encryption from Lattices 2021 Dutta, Priyanka
Small Superset and Big Subset Obfuscation 2021 Galbraith, Steven D.
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More 2021 Abdolmaleki, Behzad
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V 2021 Hoki, Jin
Security Analysis of End-to-End Encryption for Zoom Meetings 2021 Isobe, Takanori
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose 2021 Haines, Thomas
Alle Artikel auflisten