Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
State of the art of zero-knowledge proofs in blockchain
Blockchain technology promises a decentralized ecosystem for building apps with
decentralized ownership and high security level. One of the most adopted blockchain …
decentralized ownership and high security level. One of the most adopted blockchain …
Forward and backward private searchable encryption from constrained cryptographic primitives
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can
securely outsource a database to an untrusted server, in such a way that the database can …
securely outsource a database to an untrusted server, in such a way that the database can …
Recursive proof composition without a trusted setup
S Bowe, J Grigg, D Hopwood - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Non-interactive arguments of knowledge are powerful cryptographic tools that can be used
to demonstrate the faithful execution of arbitrary computations with publicly verifiable proofs …
to demonstrate the faithful execution of arbitrary computations with publicly verifiable proofs …
Zokrates-scalable privacy-preserving off-chain computations
Scalability and privacy are two challenges for today's blockchain systems. Processing
transactions at every node in the system limits the system's ability to scale. Furthermore, the …
transactions at every node in the system limits the system's ability to scale. Furthermore, the …
[PDF][PDF] Zcash protocol specification
D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - caladex.io
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …
with security fixes and improvements to performance and functionality. It bridges the existing …
Succinct {Non-Interactive} zero knowledge for a von neumann architecture
We build a system that provides succinct non-interactive zero-knowledge proofs (zk-
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …
Pinocchio: Nearly practical verifiable computation
To instill greater confidence in computations outsourced to the cloud, clients should be able
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …
MIStore: a blockchain-based medical insurance storage system
L Zhou, L Wang, Y Sun - Journal of medical systems, 2018 - Springer
Currently, blockchain technology, which is decentralized and may provide tamper-resistance
to recorded data, is experiencing exponential growth in industry and research. In this paper …
to recorded data, is experiencing exponential growth in industry and research. In this paper …
HomeChain: A blockchain-based secure mutual authentication system for smart homes
Increasingly, governments around the world, particularly in technologically advanced
countries, are exploring or implementing smart homes, or the related smart facilities for the …
countries, are exploring or implementing smart homes, or the related smart facilities for the …