Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Flamingo: Multi-round single-server secure aggregation with applications to private federated learning
This paper introduces Flamingo, a system for secure aggregation of data across a large set
of clients. In secure aggregation, a server sums up the private inputs of clients and obtains …
of clients. In secure aggregation, a server sums up the private inputs of clients and obtains …
[PDF][PDF] Zcash protocol specification
D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - caladex.io
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …
with security fixes and improvements to performance and functionality. It bridges the existing …
MuSig-L: Lattice-based multi-signature with single-round online phase
Multi-signatures are protocols that allow a group of signers to jointly produce a single
signature on the same message. In recent years, a number of practical multi-signature …
signature on the same message. In recent years, a number of practical multi-signature …
Elligator: elliptic-curve points indistinguishable from uniform random strings
DJ Bernstein, M Hamburg, A Krasnova… - Proceedings of the 2013 …, 2013 - dl.acm.org
Censorship-circumvention tools are in an arms race against censors. The censors study all
traffic passing into and out of their controlled sphere, and try to disable censorship …
traffic passing into and out of their controlled sphere, and try to disable censorship …
MuSig-DN: Schnorr multi-signatures with verifiably deterministic nonces
MuSig is a multi-signature scheme for Schnorr signatures, which supports key aggregation
and is secure in the plain public key model. Standard derandomization techniques for …
and is secure in the plain public key model. Standard derandomization techniques for …
NIZKs with an untrusted CRS: security in the face of parameter subversion
Motivated by the subversion of “trusted” public parameters in mass-surveillance activities,
this paper studies the security of NIZKs in the presence of a maliciously chosen common …
this paper studies the security of NIZKs in the presence of a maliciously chosen common …
Subversion-zero-knowledge SNARKs
G Fuchsbauer - Iacr international workshop on public key cryptography, 2018 - Springer
Subversion zero knowledge for non-interactive proof systems demands that zero knowledge
(ZK) be maintained even when the common reference string (CRS) is chosen maliciously …
(ZK) be maintained even when the common reference string (CRS) is chosen maliciously …
Pixel: Multi-signatures for consensus
In Proof-of-Stake (PoS) and permissioned blockchains, a committee of verifiers agrees and
sign every new block of transactions. These blocks are validated, propagated, and stored by …
sign every new block of transactions. These blocks are validated, propagated, and stored by …
Fast and simple constant-time hashing to the BLS12-381 elliptic curve
Pairing-friendly elliptic curves in the Barreto-Lynn-Scott family are seeing a resurgence in
popularity because of the recent result of Kim and Barbulescu that improves attacks against …
popularity because of the recent result of Kim and Barbulescu that improves attacks against …