搜索结果: 1-2 共查到“军事学 adaptive corruptions”相关记录2条 . 查询时间(0.058 秒)
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
Smooth Projective Hash Functions Oblivious Transfer
2019/6/19
Since the seminal result of Kilian, Oblivious Transfer has proven to be a fundamental primitive in cryptography. In such a scheme, a user is able to gain access to an element owned by a server, withou...
Key confirmation and adaptive corruptions in the protocol security logic
Key confirmation adaptive corruptions protocol security logic
2008/11/21
Cryptographic security for key exchange and secure session establishment
protocols is often defined in the so called “adaptive corruptions” model.
Even if the adversary corrupts one of the participa...