Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general
V Lyubashevsky, NK Nguyen, M Plançon - Annual International …, 2022 - Springer
We present a much-improved practical protocol, based on the hardness of Module-SIS and
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …
Threshold cryptosystems from threshold fully homomorphic encryption
We develop a general approach to adding a threshold functionality to a large class of (non-
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …
Practical non-interactive publicly verifiable secret sharing with thousands of parties
Non-interactive publicly verifiable secret sharing (PVSS) schemes enables (re-) sharing of
secrets in a decentralized setting in the presence of malicious parties. A recently proposed …
secrets in a decentralized setting in the presence of malicious parties. A recently proposed …
MuSig-L: Lattice-based multi-signature with single-round online phase
Multi-signatures are protocols that allow a group of signers to jointly produce a single
signature on the same message. In recent years, a number of practical multi-signature …
signature on the same message. In recent years, a number of practical multi-signature …
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations
We introduce a novel generic ring signature construction, called DualRing, which can be
built from several canonical identification schemes (such as Schnorr identification) …
built from several canonical identification schemes (such as Schnorr identification) …
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …
garnered renewed interest in recent years in view of novel applications to topics like …
MatRiCT: efficient, scalable and post-quantum blockchain confidential transactions protocol
We introduce MatRiCT, an efficient RingCT protocol for blockchain confidential transactions,
whose security is based on" post-quantum''(module) lattice assumptions. The proof length of …
whose security is based on" post-quantum''(module) lattice assumptions. The proof length of …
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
We provide new zero-knowledge argument of knowledge systems that work directly for a
wide class of language, namely, ones involving the satisfiability of matrix-vector relations …
wide class of language, namely, ones involving the satisfiability of matrix-vector relations …
Practical exact proofs from lattices: New techniques to exploit fully-splitting rings
We propose a very fast lattice-based zero-knowledge proof system for exactly proving
knowledge of a ternary solution ⃗ s ∈ {-1, 0, 1\}^ ns→∈-1, 0, 1 n to a linear equation A ⃗ s …
knowledge of a ternary solution ⃗ s ∈ {-1, 0, 1\}^ ns→∈-1, 0, 1 n to a linear equation A ⃗ s …
A framework for practical anonymous credentials from lattices
We present a framework for building practical anonymous credential schemes based on the
hardness of lattice problems. The running time of the prover and verifier is independent of …
hardness of lattice problems. The running time of the prover and verifier is independent of …