Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training
The space-air-ground-sea three-dimensional (3D) network is a comprehensive
communication network system. This 3D network combines extensive coverage of satellite …
communication network system. This 3D network combines extensive coverage of satellite …
Threshold ECDSA in three rounds
We present a three-round protocol for threshold ECDSA signing with malicious security
against a dishonest majority, which information-theoretically UC-realizes a standard …
against a dishonest majority, which information-theoretically UC-realizes a standard …
Scalability and Security of Blockchain-empowered Metaverse: A Survey
Metaverse brings unlimited space and tremendous potential since it is an integrated
application of multiple fundamental technologies such as artificial intelligence, blockchain …
application of multiple fundamental technologies such as artificial intelligence, blockchain …
Threshold structure-preserving signatures: Strong and adaptive security under standard assumptions
Abstract Structure-preserving signatures (SPS) have emerged as an important cryptographic
building block, as their compatibility with the Groth-Sahai (GS) NIZK framework allows to …
building block, as their compatibility with the Groth-Sahai (GS) NIZK framework allows to …
H2CT: Asynchronous Distributed Key Generation With High Computational Efficiency and Threshold Security in Blockchain Network
Asynchronous distributed key generation (ADKG) is a strong-robustness key management
technology to bootstrap threshold cryptosystems without a global clock, which can enable …
technology to bootstrap threshold cryptosystems without a global clock, which can enable …
Accountable and secure threshold EdDSA signature and its applications
Threshold signatures as a method to realize multi-party cooperation and trust distribution in
blockchain have been widely studied in recent years. However, among these researches …
blockchain have been widely studied in recent years. However, among these researches …
How (Not) to build threshold EdDSA
Edwards-curve digital signature algorithm (EdDSA) is a highly efficient scheme with a short
key size. It is derived from the threshold-friendly Schnorr signatures and is covered by the …
key size. It is derived from the threshold-friendly Schnorr signatures and is covered by the …
Efficient Proofs of Possession for Legacy Signatures
Digital signatures underpin identity, authenticity, and trust in modern computer systems.
Cryptography research has shown that it is possible to prove possession of a valid message …
Cryptography research has shown that it is possible to prove possession of a valid message …
Batch Range Proof: How to Make Threshold ECDSA More Efficient
G Tang, S Han, L Lin, C Wei, Y Yan - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
With the demand of cryptocurrencies, threshold ECDSA recently regained popularity. So far,
several methods have been proposed to construct threshold ECDSA, including the usage of …
several methods have been proposed to construct threshold ECDSA, including the usage of …
[HTML][HTML] An efficient Proof-of-Authority consensus scheme against cloning attacks
Abstract Proof-of-Authorization (PoA) consensus algorithms are widely used in
permissioned blockchain networks due to their high throughput, security, and efficiency …
permissioned blockchain networks due to their high throughput, security, and efficiency …