Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Threshold cryptosystems from threshold fully homomorphic encryption
We develop a general approach to adding a threshold functionality to a large class of (non-
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …
Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices
Although they have been studied for a long time, distributed signature protocols have
garnered renewed interest in recent years in view of novel applications to topics like …
garnered renewed interest in recent years in view of novel applications to topics like …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringCT v1. 0)
In this paper, we construct a Lattice-based one-time Linkable Ring Signature (L2RS)
scheme, which enables the public to verify if two or more signatures were generated by …
scheme, which enables the public to verify if two or more signatures were generated by …
An attack on some signature schemes constructed from five-pass identification schemes
D Kales, G Zaverucha - … Conference on Cryptology and Network Security, 2020 - Springer
We present a generic forgery attack on signature schemes constructed from 5-round
identification schemes made non-interactive with the Fiat-Shamir transform. The attack …
identification schemes made non-interactive with the Fiat-Shamir transform. The attack …
Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey
J Chen, H Deng, H Su, M Yuan, Y Ren - Electronics, 2024 - mdpi.com
As the most popular cryptographic scheme in the post-quantum field, lattices have received
extensive attention and research. Not only do they provide quantum-resistant security, they …
extensive attention and research. Not only do they provide quantum-resistant security, they …
Efficient linkable and/or threshold ring signature without random oracles
Linkable ring signatures have found many attractive applications. One of the recent
important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately …
important extensions is a linkable threshold ring signature (LTRS) scheme. Unfortunately …
How to share a lattice trapdoor: threshold protocols for signatures and (H) IBE
We develop secure threshold protocols for two important operations in lattice cryptography,
namely, generating a hard lattice Λ together with a “strong” trapdoor, and sampling from a …
namely, generating a hard lattice Λ together with a “strong” trapdoor, and sampling from a …
An efficient multivariate threshold ring signature scheme
At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with
security reduction to the MQ problem and impersonation probability 2 3. Petzoldt et …
security reduction to the MQ problem and impersonation probability 2 3. Petzoldt et …
A privacy-preserving framework for endorsement process in hyperledger fabric
Hyperledger Fabric is a permissioned flavor of blockchain which offers various privacy
features to its users. It stands out from other permissioned framework by allowing only a …
features to its users. It stands out from other permissioned framework by allowing only a …