Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Indistinguishability obfuscation from functional encryption
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to
almost any known cryptographic object. Prior candidate IO constructions were based on …
almost any known cryptographic object. Prior candidate IO constructions were based on …
Registered (inner-product) functional encryption
Registered encryption (Garg et al., TCC'18) is an emerging paradigm that tackles the key-
escrow problem associated with identity-based encryption by replacing the private-key …
escrow problem associated with identity-based encryption by replacing the private-key …
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
We consider the question of finding the lowest degree L for which L-linear maps suffice to
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …
Revisiting the cryptographic hardness of finding a nash equilibrium
The exact hardness of computing a Nash equilibrium is a fundamental open question in
algorithmic game theory. This problem is complete for the complexity class PPAD. It is well …
algorithmic game theory. This problem is complete for the complexity class PPAD. It is well …
Distinguisher-dependent simulation in two rounds and its applications
We devise a novel simulation technique that makes black-box use of the adversary as well
as the distinguisher. Using this technique we construct several round-optimal protocols …
as the distinguisher. Using this technique we construct several round-optimal protocols …
Registered FE beyond predicates:(attribute-based) linear functions and more
This paper introduces the first registered functional encryption RFE scheme tailored for
linear functions. Distinctly different from classical functional encryption (FE), RFE addresses …
linear functions. Distinctly different from classical functional encryption (FE), RFE addresses …
Deniable fully homomorphic encryption from learning with errors
We define and construct Deniable Fully Homomorphic Encryption based on the Learning
With Errors (LWE) polynomial hardness assumption. Deniable FHE enables storing …
With Errors (LWE) polynomial hardness assumption. Deniable FHE enables storing …
From cryptomania to obfustopia through secret-key functional encryption
Functional encryption lies at the frontiers of the current research in cryptography; some
variants have been shown sufficiently powerful to yield indistinguishability obfuscation (IO) …
variants have been shown sufficiently powerful to yield indistinguishability obfuscation (IO) …
Indistinguishability obfuscation via mathematical proofs of equivalence
Over the last decade, indistinguishability obfuscation (iO) has emerged as a seemingly
omnipotent primitive with numerous applications to cryptography and beyond. Moreover …
omnipotent primitive with numerous applications to cryptography and beyond. Moreover …
The complexity of public-key cryptography
B Barak - Tutorials on the Foundations of Cryptography …, 2017 - Springer
The Complexity of Public-Key Cryptography Page 1 Chapter 2 The Complexity of Public-Key
Cryptography Boaz Barak Abstract We survey the computational foundations for public-key …
Cryptography Boaz Barak Abstract We survey the computational foundations for public-key …