investigate the anonymity and robustness of NIST PQC Round3 KEMs posed by Grubbs, Maram, and Paterson (EUROCRYPT 2022).We use strong disjoint-simulatability of the underlying PKE of KEM and strong pseudorandomness and smoothness/sparseness of KEM as the main tools, which will be of independent ...
International Journal of Geo-Information Article Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain Hui Wang 1,2, Haiping Huang 1,2,3,4,*, Yuxiang Qin 1,2, Yunqi Wang 1,2 and Min Wu 1,2,3 1 School of Computer Science, Nanjing University of Posts and ...