Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy preserving keyword searches on remote encrypted data
We consider the following problem: a user U wants to store his files in an encrypted form on
a remote file server S. Later the user U wants to efficiently retrieve some of the encrypted …
a remote file server S. Later the user U wants to efficiently retrieve some of the encrypted …
Comprehensive survey on privacy-preserving protocols for sealed-bid auctions
R Alvarez, M Nojoumian - Computers & Security, 2020 - Elsevier
The internet is a ubiquitous technology that has changed conventional human interactions.
In our present time, it is not unusual for financial transactions to take place virtually with …
In our present time, it is not unusual for financial transactions to take place virtually with …
A survey on zero knowledge range proofs and applications
E Morais, T Koens, C Van Wijk, A Koren - SN Applied Sciences, 2019 - Springer
In last years, there has been an increasing effort to leverage distributed ledger technology
(DLT), including blockchain. One of the main topics of interest, given its importance, is the …
(DLT), including blockchain. One of the main topics of interest, given its importance, is the …
On private scalar product computation for privacy-preserving data mining
In mining and integrating data from multiple sources, there are many privacy and security
issues. In several different contexts, the security of the full privacy-preserving data mining …
issues. In several different contexts, the security of the full privacy-preserving data mining …
An oblivious transfer protocol with log-squared communication
H Lipmaa - Information Security: 8th International Conference, ISC …, 2005 - Springer
We propose a one-round 1-out-of-n computationally-private information retrieval protocol for
ℓ-bit strings with low-degree polylogarithmic receiver-computation, linear sender …
ℓ-bit strings with low-degree polylogarithmic receiver-computation, linear sender …
An efficient solution to the millionaires' problem based on homomorphic encryption
HY Lin, WG Tzeng - Applied Cryptography and Network Security: Third …, 2005 - Springer
We proposed a two-round protocol for solving the Millionaires' Problem in the setting of semi-
honest parties. Our protocol uses either multiplicative or additive homomorphic encryptions …
honest parties. Our protocol uses either multiplicative or additive homomorphic encryptions …
A generalization of Paillier's public-key system with applications to electronic voting
We propose a generalization of Paillier's probabilistic public-key system, in which the
expansion factor is reduced and which allows to adjust the block length of the scheme even …
expansion factor is reduced and which allows to adjust the block length of the scheme even …
Redesigning bitcoin's fee market
The Bitcoin payment system involves two agent types: users that transact with the currency
and pay fees and miners in charge of authorizing transactions and securing the system in …
and pay fees and miners in charge of authorizing transactions and securing the system in …
Identity-based chameleon hash and applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm,
and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon …
and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon …
Group signatures from lattices: simpler, tighter, shorter, ring-based
We introduce a lattice-based group signature scheme that provides several noticeable
improvements over the contemporary ones: simpler construction, weaker hardness …
improvements over the contemporary ones: simpler construction, weaker hardness …