Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Verifiable quantum advantage without structure
We show the following hold, unconditionally unless otherwise stated, relative to a random
oracle:—There are NP search problems solvable by quantum polynomial-time (QPT) …
oracle:—There are NP search problems solvable by quantum polynomial-time (QPT) …
SNARGs for from LWE
We provide the first construction of a succinct non-interactive argument (SNARG) for all
polynomial time deterministic computations based on standard assumptions. For T steps of …
polynomial time deterministic computations based on standard assumptions. For T steps of …
SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE
We construct a succinct non-interactive publicly-verifiable delegation scheme for any log-
space uniform circuit under the sub-exponential Learning With Errors (LWE) assumption. For …
space uniform circuit under the sub-exponential Learning With Errors (LWE) assumption. For …
SNARGs for P from sub-exponential DDH and QR
We obtain publicly verifiable Succinct Non-Interactive Arguments (SNARGs) for arbitrary
deterministic computations and bounded space non-deterministic computation from …
deterministic computations and bounded space non-deterministic computation from …
Cryptographic hashing from strong one-way functions (or: One-way product functions and their applications)
Constructing collision-resistant hash families (CRHFs) from one-way functions is a long-
standing open problem and source of frustration in theoretical cryptography. In fact, there are …
standing open problem and source of frustration in theoretical cryptography. In fact, there are …
Commitments to quantum states
What does it mean to commit to a quantum state? In this work, we propose a simple answer:
a commitment to quantum messages is binding if, after the commit phase, the committed …
a commitment to quantum messages is binding if, after the commit phase, the committed …
Fiat–shamir via list-recoverable codes (or: parallel repetition of gmw is not zero-knowledge)
In a seminal work, Goldreich, Micali and Wigderson (CRYPTO'86) demonstrated the wide
applicability of zero-knowledge proofs by constructing such a proof system for the NP …
applicability of zero-knowledge proofs by constructing such a proof system for the NP …
Post-quantum zero knowledge in constant rounds
N Bitansky, O Shmueli - Proceedings of the 52nd Annual ACM SIGACT …, 2020 - dl.acm.org
We construct a constant-round zero-knowledge classical argument for NP secure against
quantum attacks. We assume the existence of Quantum Fully-Homomorphic Encryption and …
quantum attacks. We assume the existence of Quantum Fully-Homomorphic Encryption and …
On finding quantum multi-collisions
A k-collision for a compressing hash function H is a set of k distinct inputs that all map to the
same output. In this work, we show that for any constant k,\varTheta\left (N^ 1 2 (1-1 2^ k …
same output. In this work, we show that for any constant k,\varTheta\left (N^ 1 2 (1-1 2^ k …
Promise zero knowledge and its applications to round optimal MPC
We devise a new partitioned simulation technique for MPC where the simulator uses
different strategies for simulating the view of aborting adversaries and non-aborting …
different strategies for simulating the view of aborting adversaries and non-aborting …