Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Realizing an internet of secure things: A survey on issues and enabling technologies
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
Security aspects of blockchain technology intended for industrial applications
Blockchain technology plays a significant role in the industrial development. Many industries
can potentially benefit from the innovations blockchain decentralization technology and …
can potentially benefit from the innovations blockchain decentralization technology and …
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
We describe a comparatively simple fully homomorphic encryption (FHE) scheme based on
the learning with errors (LWE) problem. In previous LWE-based FHE schemes, multiplication …
the learning with errors (LWE) problem. In previous LWE-based FHE schemes, multiplication …
Candidate indistinguishability obfuscation and functional encryption for all circuits
In this work, we study indistinguishability obfuscation and functional encryption for general
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …
How to use indistinguishability obfuscation: deniable encryption, and more
We introduce a new technique, that we call punctured programs, to apply indistinguishability
obfuscation towards cryptographic problems. We use this technique to carry out a systematic …
obfuscation towards cryptographic problems. We use this technique to carry out a systematic …
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret
keys: the size of keys in our system depends only on the depth of the policy circuit, not its …
keys: the size of keys in our system depends only on the depth of the policy circuit, not its …
Candidate multilinear maps from ideal lattices
We describe plausible lattice-based constructions with properties that approximate the
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …
Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
Fully secure functional encryption for inner products, from standard assumptions
Functional encryption is a modern public-key paradigm where a master secret key can be
used to derive sub-keys SK_F associated with certain functions F in such a way that the …
used to derive sub-keys SK_F associated with certain functions F in such a way that the …
Attribute-based encryption for circuits
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public
index ind and a message m, and a secret key is associated with a Boolean predicate P. The …
index ind and a message m, and a secret key is associated with a Boolean predicate P. The …