Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
This paper presents efficient structure-preserving signature schemes based on simple
assumptions such as decisional linear. We first give two general frameworks for constructing …
assumptions such as decisional linear. We first give two general frameworks for constructing …
Structure-preserving signatures and commitments to group elements
A modular approach to constructing cryptographic protocols leads to simple designs but
often inefficient instantiations. On the other hand, ad hoc constructions may yield efficient …
often inefficient instantiations. On the other hand, ad hoc constructions may yield efficient …
Structure-preserving chosen-ciphertext security with shorter verifiable ciphertexts
Abstract Structure-preserving cryptography is a world where messages, signatures,
ciphertexts and public keys are entirely made of elements of a group over which a bilinear …
ciphertexts and public keys are entirely made of elements of a group over which a bilinear …
Adaptive oblivious transfer with access control from lattice assumptions
Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database
{M_i\} _ i= 1^ NM ii= 1 N. Then, a receiver can query the sender up to k times with private …
{M_i\} _ i= 1^ NM ii= 1 N. Then, a receiver can query the sender up to k times with private …
Blind attribute-based encryption and oblivious transfer with fine-grained access control
A Rial - Designs, Codes and Cryptography, 2016 - Springer
We propose two constructions of oblivious transfer with access control (OTAC), ie, oblivious
transfer schemes in which a receiver can obtain a message only if her attributes, which are …
transfer schemes in which a receiver can obtain a message only if her attributes, which are …
Adaptive oblivious transfer with access control from lattice assumptions
Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database
{M i} i= 1 N. Then, a receiver can query the sender up to k times with private indexes ρ 1 …
{M i} i= 1 N. Then, a receiver can query the sender up to k times with private indexes ρ 1 …
Unlinkable updatable databases and oblivious transfer with access control
An oblivious transfer with access control protocol (OTAC) allows us to protect privacy of
accesses to a database while enforcing access control policies. Existing OTAC have several …
accesses to a database while enforcing access control policies. Existing OTAC have several …
Universally composable issuer‐free adaptive oblivious transfer with access policy
V Guleria, R Dutta - Security and Communication Networks, 2015 - Wiley Online Library
In today's Internet world, security, privacy and efficiency are three prime concerns in
designing any cryptographic protocol. Adaptive oblivious transfer with access policy (AOT …
designing any cryptographic protocol. Adaptive oblivious transfer with access policy (AOT …
Pirmission: Single-server PIR with Access Control
A Beams, S Angel - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Databases often require the flexibility to control which entities can access specific database
records. Such access control is absent in works that provide private access to databases …
records. Such access control is absent in works that provide private access to databases …
UC updatable databases and applications
We define an ideal functionality F _ UD and a construction Π _ UD for an updatable
database (UD). UD is a two-party protocol between an updater and a reader. The updater …
database (UD). UD is a two-party protocol between an updater and a reader. The updater …