Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Trapdoor hash functions and their applications
We introduce a new primitive, called trapdoor hash functions (TDH), which are hash
functions H:{0, 1\}^ n → {0, 1\}^ λ with additional trapdoor function-like properties …
functions H:{0, 1\}^ n → {0, 1\}^ λ with additional trapdoor function-like properties …
Efficient laconic cryptography from learning with errors
Laconic cryptography is an emerging paradigm that enables cryptographic primitives with
sublinear communication complexity in just two messages. In particular, a two-message …
sublinear communication complexity in just two messages. In particular, a two-message …
Non-interactive batch arguments for NP from standard assumptions
We study the problem of designing non-interactive batch arguments for NP NP. Such an
argument system allows an efficient prover to prove multiple NP NP statements, with size …
argument system allows an efficient prover to prove multiple NP NP statements, with size …
On the (in) security of secure ros2
Robot Operating System (ROS) has been the mainstream platform for research and
development of robotic applications. This platform is well-known for lacking security features …
development of robotic applications. This platform is well-known for lacking security features …
Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
V Koppula, B Waters - Annual international cryptology conference, 2019 - Springer
We provide generic and black box transformations from any chosen plaintext secure
Attribute-Based Encryption (ABE) or One-sided Predicate Encryption system into a chosen …
Attribute-Based Encryption (ABE) or One-sided Predicate Encryption system into a chosen …
Provably secure optimal homomorphic signcryption for satellite-based internet of things
Satellites have long been reliable and widely used mediums for communication. With recent
advancements in the Internet of Things (IoT), satellite-based IoT has emerged, enhancing …
advancements in the Internet of Things (IoT), satellite-based IoT has emerged, enhancing …
Amortizing rate-1 OT and applications to PIR and PSI
Recent new constructions of rate-1 OT Döttling, Garg, Ishai, Malavolta, Mour, and Ostrovsky,
CRYPTO 2019 have brought this primitive under the spotlight and the techniques have led …
CRYPTO 2019 have brought this primitive under the spotlight and the techniques have led …
A note on non-interactive zero-knowledge from CDH
We build non-interactive zero-knowledge (NIZK) and ZAP arguments for all NP where
soundness holds for infinitely-many security parameters, and against uniform adversaries …
soundness holds for infinitely-many security parameters, and against uniform adversaries …
Efficient range-trapdoor functions and applications: Rate-1 OT and more
Substantial work on trapdoor functions (TDFs) has led to many powerful notions and
applications. However, despite tremendous work and progress, all known constructions …
applications. However, despite tremendous work and progress, all known constructions …
Chosen ciphertext security from injective trapdoor functions
Chosen Ciphertext Security from Injective Trapdoor Functions | SpringerLink Skip to main
content Advertisement Springer Nature Link Account Menu Find a journal Publish with us Track …
content Advertisement Springer Nature Link Account Menu Find a journal Publish with us Track …