Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Sok: Delay-based cryptography
In this work, we provide a systematisation of knowledge of delay-based cryptography, in
which we discuss and compare the existing primitives within cryptography that utilise a time …
which we discuss and compare the existing primitives within cryptography that utilise a time …
Universally composable simultaneous broadcast against a dishonest majority and applications
Simultaneous broadcast (SBC) protocols, introduced in [Chor et al., FOCS 1985], constitute
a special class of broadcast channels which, besides consistency, guarantee that all …
a special class of broadcast channels which, besides consistency, guarantee that all …
Composing timed cryptographic protocols: Foundations and applications
Time-lock puzzles are unique cryptographic primitives that use computational complexity to
keep information secret for some period of time, after which security expires. Unfortunately …
keep information secret for some period of time, after which security expires. Unfortunately …
Completeness theorems for adaptively secure broadcast
The advent of blockchain protocols has reignited the interest in adaptively secure broadcast;
it is by now well understood that broadcasting over a diffusion network allows an adaptive …
it is by now well understood that broadcasting over a diffusion network allows an adaptive …
ChronoCloak: An Integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination
A Zawia, MA Hasan - International Conference on Information Security, 2024 - Springer
With the increasing use of online digital content delivery, such as games, videos, and
magazine articles, there are scenarios where it is crucial to prevent premature revelation of …
magazine articles, there are scenarios where it is crucial to prevent premature revelation of …
Challenges in Timed Cryptography: A Position Paper
Time-lock puzzles are unique cryptographic primitives that use computational complexity to
keep information secret for some period of time, after which security expires. This topic, while …
keep information secret for some period of time, after which security expires. This topic, while …
Send Message to the Future? Blockchain-based Time Machines for Decentralized Reveal of Locked Information
Conditional information reveal systems automate the release of information upon meeting
specific predefined conditions, such as time or location. This paper introduces a …
specific predefined conditions, such as time or location. This paper introduces a …
Standard model time-lock puzzles: Defining security and constructing via composition
The introduction of time-lock puzzles initiated the study of publicly “sending information into
the future.” For time-lock puzzles, the underlying security-enabling mechanism is the …
the future.” For time-lock puzzles, the underlying security-enabling mechanism is the …
Challenges in Timed-Cryptography: A Position Paper (Short Paper)
Time-lock puzzles are unique cryptographic primitives that use computational complexity to
keep information secret for some period of time, after which security expires. This topic in …
keep information secret for some period of time, after which security expires. This topic in …
E-cclesia: Universally composable self-tallying elections
The technological advancements of the digital era paved the way for the facilitation of
electronic voting (e-voting) in the promise of efficiency and enhanced security. In standard e …
electronic voting (e-voting) in the promise of efficiency and enhanced security. In standard e …