Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
Quantum-safe round-optimal password authentication for mobile devices
Password authentication is the dominant form of access control for the Web and mobile
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
devices, and its practicality and ubiquity is unlikely to be replaced by other authentication …
Randomized half-ideal cipher on groups with applications to UC (a) PAKE
Abstract An Ideal Cipher (IC) is a cipher where each key defines a random permutation on
the domain. Ideal Cipher on a group has many attractive applications, eg, the Encrypted Key …
the domain. Ideal Cipher on a group has many attractive applications, eg, the Encrypted Key …
Achieving one-round password-based authenticated key exchange over lattices
Password-based authenticated key exchange () protocol, a widely used authentication
mechanism to realize secure communication, allows protocol participants to establish a high …
mechanism to realize secure communication, allows protocol participants to establish a high …
GeT a CAKE: Ge neric T ransformations from K ey Encaspulation Mechanisms to Password A uthenticated K ey E xchanges
H Beguinet, C Chevalier, D Pointcheval… - … Conference on Applied …, 2023 - Springer
Abstract Password Authenticated Key Exchange (PAKE) have become a key building block
in many security products as they provide interesting efficiency/security trade-offs. Indeed, a …
in many security products as they provide interesting efficiency/security trade-offs. Indeed, a …
Hash proof systems over lattices revisited
Abstract Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of
implicit arguments introduced by Cramer and Shoup at Eurocrypt'02. They have found many …
implicit arguments introduced by Cramer and Shoup at Eurocrypt'02. They have found many …
A generic construction of tightly secure password-based authenticated key exchange
We propose a generic construction of password-based authenticated key exchange (PAKE)
from key encapsulation mechanisms (KEM). Assuming that the KEM is oneway secure …
from key encapsulation mechanisms (KEM). Assuming that the KEM is oneway secure …
Multi-theorem preprocessing NIZKs from lattices
S Kim, DJ Wu - Journal of Cryptology, 2020 - Springer
Non-interactive zero-knowledge (NIZK) proofs are fundamental to modern cryptography.
Numerous NIZK constructions are known in both the random oracle and the common …
Numerous NIZK constructions are known in both the random oracle and the common …
Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things
In recent years, the Internet of Things (IoT) has gained immense popularity in various
aspects of work, learning, and daily life. Within the IoT realm, there is a growing concern …
aspects of work, learning, and daily life. Within the IoT realm, there is a growing concern …
Two-round PAKE protocol over lattices without NIZK
Reducing the number of communication rounds of Password-based Authenticated Key
Exchange (PAKE PAKE) protocols is of great practical significance. At PKC'15, Abdalla et al …
Exchange (PAKE PAKE) protocols is of great practical significance. At PKC'15, Abdalla et al …