Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Pad-net: Multi-tasks guided prediction-and-distillation network for simultaneous depth estimation and scene parsing
Depth estimation and scene parsing are two particularly important tasks in visual scene
understanding. In this paper we tackle the problem of simultaneous depth estimation and …
understanding. In this paper we tackle the problem of simultaneous depth estimation and …
Candidate indistinguishability obfuscation and functional encryption for all circuits
In this work, we study indistinguishability obfuscation and functional encryption for general
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …
Fully secure functional encryption for inner products, from standard assumptions
Functional encryption is a modern public-key paradigm where a master secret key can be
used to derive sub-keys SK_F associated with certain functions F in such a way that the …
used to derive sub-keys SK_F associated with certain functions F in such a way that the …
Multi-input functional encryption
We introduce the problem of Multi-Input Functional Encryption, where a secret key sk f can
correspond to an n-ary function f that takes multiple ciphertexts as input. We formulate both …
correspond to an n-ary function f that takes multiple ciphertexts as input. We formulate both …
Indistinguishability obfuscation from functional encryption
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to
almost any known cryptographic object. Prior candidate IO constructions were based on …
almost any known cryptographic object. Prior candidate IO constructions were based on …
Indistinguishability obfuscation from compact functional encryption
The arrival of indistinguishability obfuscation (i O i O) has transformed the cryptographic
landscape by enabling several security goals that were previously beyond our reach …
landscape by enabling several security goals that were previously beyond our reach …
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation
Deciding “greater-than” relations among data items just given their encryptions is at the
heart of search algorithms on encrypted data, most notably, non-interactive binary search on …
heart of search algorithms on encrypted data, most notably, non-interactive binary search on …
Function-hiding inner product encryption
We extend the reach of functional encryption schemes that are provably secure under
simple assumptions against unbounded collusion to include function-hiding inner product …
simple assumptions against unbounded collusion to include function-hiding inner product …
A punctured programming approach to adaptively secure functional encryption
B Waters - Annual Cryptology Conference, 2015 - Springer
We propose the first construction for achieving adaptively secure functional encryption (FE)
for poly-sized circuits (without complexity leveraging) from indistinguishability obfuscation (i …
for poly-sized circuits (without complexity leveraging) from indistinguishability obfuscation (i …
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
We consider the question of finding the lowest degree L for which L-linear maps suffice to
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …