{"version":"https://jsonfeed.org/version/1.1","title":"苏迟但到的主页","home_page_url":"https://kexohproject.pages.dev","feed_url":"https://kexohproject.pages.dev/json/","description":"<p>你好，欢迎访问个人主页！</p><p>擅长密码学，安全分析，数字水印等技术。</p><p>你可以联系我通过:findmykexin@gmail.com或者知乎私信。</p><p>我的知乎链接：<a href=\"https://www.zhihu.com/people/su-chi-dan-dao\" rel=\"noopener noreferrer\" target=\"_blank\">苏迟但到 - 知乎 (zhihu.com)</a></p><p>我的github链接：<a href=\"https://github.com/kexinoh\" rel=\"noopener noreferrer\" target=\"_blank\">kexinoh</a></p>","icon":"https://kexohcdn.gptapi.cyou/kexohproject/production/images/channel-2e54d141ee195646ca12a9d16507a908.jpg","favicon":"https://kexohcdn.gptapi.cyou/kexohproject/production/images/favicon-340a2925d02a0386f3b954a032834917.jpg","authors":[{"name":"苏迟但到"}],"language":"zh-cn","items":[{"id":"0Xehl_gVJdf","title":"现代密码学的安全归约证明中，困难问题实例是如何嵌入模拟方案的？能否举例说明？","content_html":"<p data-pid=\"Hq-tmXVR\">先来一道题</p><figure data-size=\"normal\"><noscript><img src=\"https://pic2.zhimg.com/v2-fc6cb00252032b258fa9e5e843d8e201_b.jpg\" data-caption=\"\" data-size=\"normal\" data-rawwidth=\"1907\" data-rawheight=\"1334\" data-original-token=\"v2-2acc163fa74a0d6cb834256787731972\" data-default-watermark-src=\"https://pic1.zhimg.com/v2-cdb74dfc009659a24563a49f51be6b20_b.jpg\" class=\"origin_image zh-lightbox-thumb\" width=\"1907\" data-original=\"https://pic2.zhimg.com/v2-fc6cb00252032b258fa9e5e843d8e201_r.jpg\"/></noscript><img src=\"data:image/svg+xml;utf8,&lt;svg xmlns=&#39;http://www.w3.org/2000/svg&#39; width=&#39;1907&#39; height=&#39;1334&#39;&gt;&lt;/svg&gt;\" data-caption=\"\" data-size=\"normal\" data-rawwidth=\"1907\" data-rawheight=\"1334\" data-original-token=\"v2-2acc163fa74a0d6cb834256787731972\" data-default-watermark-src=\"https://pic1.zhimg.com/v2-cdb74dfc009659a24563a49f51be6b20_b.jpg\" class=\"origin_image zh-lightbox-thumb lazy\" width=\"1907\" data-original=\"https://pic2.zhimg.com/v2-fc6cb00252032b258fa9e5e843d8e201_r.jpg\" data-actualsrc=\"https://pic2.zhimg.com/v2-fc6cb00252032b258fa9e5e843d8e201_b.jpg\"/></figure><p data-pid=\"PQ4tONTy\">再来一个答案</p><figure data-size=\"normal\"><noscript><img src=\"https://pic2.zhimg.com/v2-a99d01f3e60eddd02a15cbff476e37bd_b.jpg\" data-caption=\"\" data-size=\"normal\" data-rawwidth=\"1222\" data-rawheight=\"607\" data-original-token=\"v2-d587cfdad502cd3b70a19fc5a68835c5\" data-default-watermark-src=\"https://pic3.zhimg.com/v2-55b4da99c6ae63dfabf2aee4b5af3fa2_b.jpg\" class=\"origin_image zh-lightbox-thumb\" width=\"1222\" data-original=\"https://pic2.zhimg.com/v2-a99d01f3e60eddd02a15cbff476e37bd_r.jpg\"/></noscript><img src=\"data:image/svg+xml;utf8,&lt;svg xmlns=&#39;http://www.w3.org/2000/svg&#39; width=&#39;1222&#39; height=&#39;607&#39;&gt;&lt;/svg&gt;\" data-caption=\"\" data-size=\"normal\" data-rawwidth=\"1222\" data-rawheight=\"607\" data-original-token=\"v2-d587cfdad502cd3b70a19fc5a68835c5\" data-default-watermark-src=\"https://pic3.zhimg.com/v2-55b4da99c6ae63dfabf2aee4b5af3fa2_b.jpg\" class=\"origin_image zh-lightbox-thumb lazy\" width=\"1222\" data-original=\"https://pic2.zhimg.com/v2-a99d01f3e60eddd02a15cbff476e37bd_r.jpg\" data-actualsrc=\"https://pic2.zhimg.com/v2-a99d01f3e60eddd02a15cbff476e37bd_b.jpg\"/></figure><p data-pid=\"mm5iV_jQ\">目的上，它是证明敌手优势最终会归于一个困难问题上。</p><p data-pid=\"ADrXSR3i\">我们可以通过反证法来证明，证明两个问题</p><p data-pid=\"3GRs3Ls4\">1.该困难问题被解决的情况下，该方案会被攻破。</p><p data-pid=\"zBjh47Fu\">2.该方案被攻破的情况下，该困难问题也会被解决。</p><p data-pid=\"wwigNN_g\">如果以上两个条件都成立的话，我们就可以认为是安全性基于该困难问题。</p><p></p>","content_text":"先来一道题\n\n[https://pic2.zhimg.com/v2-fc6cb00252032b258fa9e5e843d8e201_b.jpg][data:image/svg+xml;utf8,&lt;svg\nxmlns=&#39;http://www.w3.org/2000/svg&#39; width=&#39;1907&#39;\nheight=&#39;1334&#39;&gt;&lt;/svg&gt;]\n\n再来一个答案\n\n[https://pic2.zhimg.com/v2-a99d01f3e60eddd02a15cbff476e37bd_b.jpg][data:image/svg+xml;utf8,&lt;svg\nxmlns=&#39;http://www.w3.org/2000/svg&#39; width=&#39;1222&#39;\nheight=&#39;607&#39;&gt;&lt;/svg&gt;]\n\n目的上，它是证明敌手优势最终会归于一个困难问题上。\n\n我们可以通过反证法来证明，证明两个问题\n\n1.该困难问题被解决的情况下，该方案会被攻破。\n\n2.该方案被攻破的情况下，该困难问题也会被解决。\n\n如果以上两个条件都成立的话，我们就可以认为是安全性基于该困难问题。\n\n","date_published":"2022-07-08T03:31:32.000Z","_microfeed":{"web_url":"https://kexohproject.pages.dev/i/现代密码学的安全归约证明中-困难问题实例是如何嵌入模拟方案的-能否举例说明-0Xehl_gVJdf/","json_url":"https://kexohproject.pages.dev/i/0Xehl_gVJdf/json/","rss_url":"https://kexohproject.pages.dev/i/0Xehl_gVJdf/rss/","guid":"0Xehl_gVJdf","status":"published","itunes:title":"New Article Title for iTunes","date_published_short":"Thu Jul 07 2022","date_published_ms":1657251092000}}],"_microfeed":{"microfeed_version":"0.1.2","base_url":"https://kexohproject.pages.dev","categories":[{"name":"Education","categories":[{"name":"Language Learning"}]},{"name":"Technology"}],"subscribe_methods":[{"name":"RSS","type":"rss","url":"https://kexohproject.pages.dev/rss/","image":"https://kexohproject.pages.dev/assets/brands/subscribe/rss.png","enabled":true,"editable":false,"id":"4KlfbtkEfzy"},{"name":"JSON","type":"json","url":"https://kexohproject.pages.dev/json/","image":"https://kexohproject.pages.dev/assets/brands/subscribe/json.png","enabled":true,"editable":false,"id":"DVFm7TYiNSq"}],"description_text":"你好，欢迎访问个人主页！\n\n擅长密码学，安全分析，数字水印等技术。\n\n你可以联系我通过:findmykexin@gmail.com或者知乎私信。\n\n我的知乎链接：苏迟但到 - 知乎 (zhihu.com)\n\n我的github链接：kexinoh","copyright":"©2024","itunes:type":"episodic","items_sort_order":"newest_first"}}