Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A decade of lattice cryptography
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
[PDF][PDF] Chainlink 2.0: Next steps in the evolution of decentralized oracle networks
In this whitepaper, we articulate a vision for the evolution of Chainlink beyond its initial
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …
Forward and backward private searchable encryption from constrained cryptographic primitives
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can
securely outsource a database to an untrusted server, in such a way that the database can …
securely outsource a database to an untrusted server, in such a way that the database can …
Wolverine: Fast, scalable, and communication-efficient zero-knowledge proofs for boolean and arithmetic circuits
Efficient zero-knowledge (ZK) proofs for arbitrary boolean or arithmetic circuits have recently
attracted much attention. Existing solutions suffer from either significant prover overhead (ie …
attracted much attention. Existing solutions suffer from either significant prover overhead (ie …
New constructions for forward and backward private symmetric searchable encryption
We study the problem of dynamic symmetric searchable encryption. In that setting, it is
crucial to minimize the information revealed to the server as a result of update operations …
crucial to minimize the information revealed to the server as a result of update operations …
Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes
We put forth new protocols for oblivious transfer extension and vector OLE, called Silver, for
SILent Vole and oblivious transfER. Silver offers extremely high performances: generating …
SILent Vole and oblivious transfER. Silver offers extremely high performances: generating …
Efficient two-round OT extension and silent non-interactive secure computation
We consider the problem of securely generating useful instances of two-party correlations,
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
How to use indistinguishability obfuscation: deniable encryption, and more
We introduce a new technique, that we call punctured programs, to apply indistinguishability
obfuscation towards cryptographic problems. We use this technique to carry out a systematic …
obfuscation towards cryptographic problems. We use this technique to carry out a systematic …
Correlated pseudorandomness from expand-accumulate codes
A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful
sources of correlated randomness, such as random oblivious transfers (OT) and vector …
sources of correlated randomness, such as random oblivious transfers (OT) and vector …
Multi-input functional encryption
We introduce the problem of Multi-Input Functional Encryption, where a secret key sk f can
correspond to an n-ary function f that takes multiple ciphertexts as input. We formulate both …
correspond to an n-ary function f that takes multiple ciphertexts as input. We formulate both …