Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security in quantum cryptography
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Secure multiparty computation
Secure multiparty computation Page 1 86 COMMUNICATIONS OF THE ACM | JANUARY 2021 |
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …
VOL. 64 | NO. 1 review articles DISTRIBUTED COMPUTING CONSIDERS the scenario where a …
Data ownership: a survey
The importance of data is increasing along its inflation in our world today. In the big data era,
data is becoming a main source for innovation, knowledge and insight, as well as a …
data is becoming a main source for innovation, knowledge and insight, as well as a …
[کتاب][B] Foundations of cryptography: volume 2, basic applications
O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …
computing systems that address security concerns. The design of cryptographic systems …
Universally composable security: A new paradigm for cryptographic protocols
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …
universally composable security. The salient property of universally composable definitions …
[کتاب][B] Secure multiparty computation and secret sharing
R Cramer, IB Damgård, JB Nielsen - 2015 - books.google.com
In a data-driven society, individuals and companies encounter numerous situations where
private information is an important resource. How can parties handle confidential data if they …
private information is an important resource. How can parties handle confidential data if they …
Analysis of key-exchange protocols and their use for building secure channels
We present a formalism for the analysis of key-exchange protocols that combines previous
definitional approaches and results in a definition of security that enjoys some important …
definitional approaches and results in a definition of security that enjoys some important …
Security and composition of multiparty cryptographic protocols
We present general definitions of security for multiparty cryptographic protocols, with focus
on the task of evaluating a probabilistic function of the parties' inputs. We show that, with …
on the task of evaluating a probabilistic function of the parties' inputs. We show that, with …
[PDF][PDF] Secure multi-party computation
More than ten years have elapsed since the rst completeness theorems for two-party and
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …
Secure multiparty computation for privacy preserving data mining
The increasing use of data-mining tools in both the public and private sectors raises
concerns regarding the potentially sensitive nature of much of the data being mined. The …
concerns regarding the potentially sensitive nature of much of the data being mined. The …