The protocols are efficient and provable secure and can tolerate the malicious behavior of up to half of the proxies.
该协议是有效的、可证安全的,并且可以容忍至多一半代理的恶意行为。
The protocols are efficient and provable secure and can tolerate the malicious behavior of up to half of the proxies.
该协议是有效的、可证安全的,并且可以容忍至多一半代理的恶意行为。
应用推荐