Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Succinct {Non-Interactive} zero knowledge for a von neumann architecture
We build a system that provides succinct non-interactive zero-knowledge proofs (zk-
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …
Efficient algorithms for supersingular isogeny Diffie-Hellman
We propose a new suite of algorithms that significantly improve the performance of
supersingular isogeny Diffie-Hellman (SIDH) key exchange. Subsequently, we present a full …
supersingular isogeny Diffie-Hellman (SIDH) key exchange. Subsequently, we present a full …
Short signatures from the Weil pairing
We introduce a short signature scheme based on the Computational Diffie-Hellman
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …
Scalable zero knowledge via cycles of elliptic curves
Non-interactive zero-knowledge proofs of knowledge for general NP statements are a
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …
Pairing-friendly elliptic curves of prime order
Previously known techniques to construct pairing-friendly curves of prime or near-prime
order are restricted to embedding degree k\leqslant6. More general methods produce …
order are restricted to embedding degree k\leqslant6. More general methods produce …
Identity-based distributed provable data possession in multicloud storage
H Wang - IEEE Transactions on Services Computing, 2014 - ieeexplore.ieee.org
Remote data integrity checking is of crucial importance in cloud storage. It can make the
clients verify whether their outsourced data is kept intact without downloading the whole …
clients verify whether their outsourced data is kept intact without downloading the whole …
Efficient pairing computation on supersingular abelian varieties
We present a general technique for the efficient computation of pairings on Jacobians of
supersingular curves. This formulation, which we call the eta pairing, generalizes results of …
supersingular curves. This formulation, which we call the eta pairing, generalizes results of …
A secure data deduplication scheme for cloud storage
As more corporate and private users outsource their data to cloud storage providers, recent
data breach incidents make end-to-end encryption an increasingly prominent requirement …
data breach incidents make end-to-end encryption an increasingly prominent requirement …
[PDF][PDF] On the implementation of pairing-based cryptosystems
B Lynn - 2007 - crypto.stanford.edu
Pairing-based cryptography has become a highly active research area. We define bilinear
maps, or pairings, and show how they give rise to cryptosystems with new functionality …
maps, or pairings, and show how they give rise to cryptosystems with new functionality …
Identity‐based remote data possession checking in public clouds
H Wang, Q Wu, B Qin… - IET Information …, 2014 - Wiley Online Library
Checking remote data possession is of crucial importance in public cloud storage. It enables
the users to check whether their outsourced data have been kept intact without downloading …
the users to check whether their outsourced data have been kept intact without downloading …