Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Single secret leader election
In a Single Secret Leader Election (SSLE), a group of participants aim to randomly choose
exactly one leader from the group with the restriction that the identity of the leader will be …
exactly one leader from the group with the restriction that the identity of the leader will be …
Gacha game analysis and design
Gacha game is a special opaque selling approach, where the seller is selling gacha pulls to
the buyer. Each gacha pull provides a certain probability for the buyer to win the gacha …
the buyer. Each gacha pull provides a certain probability for the buyer to win the gacha …
[PDF][PDF] State machine replication and consensus with Byzantine adversaries
M Davidson - NIST IR, 2023 - nvlpubs.nist.gov
The objective of state machine replication (SMR) is to emulate a centralized service in a
distributed, fault-tolerant fashion. To this end, a set of mutually distrusting processes must …
distributed, fault-tolerant fashion. To this end, a set of mutually distrusting processes must …
ZkRep: A privacy-preserving scheme for reputation-based blockchain system
Reputation/trust-based blockchain systems have attracted considerable research interests
for better integrating Internet of Things with blockchain in terms of throughput, scalability …
for better integrating Internet of Things with blockchain in terms of throughput, scalability …
Private {Proof-of-Stake} Blockchains using {Differentially-Private} Stake Distortion
Safety, liveness, and privacy are three critical properties for any private proof-of-stake (PoS)
blockchain. However, prior work (SP'21) has shown that to obtain safety and liveness, a PoS …
blockchain. However, prior work (SP'21) has shown that to obtain safety and liveness, a PoS …
Mithril: Stake-based threshold multisignatures
Stake-based multiparty cryptographic primitives operate in a setting where participants are
associated with their stake, security is argued against an adversary that is bounded by the …
associated with their stake, security is argued against an adversary that is bounded by the …
Post-quantum single secret leader election (ssle) from publicly re-randomizable commitments
Abstract A Single Secret Leader Election (SSLE) enables a group of parties to randomly
choose exactly one leader from the group with the restriction that the identity of the leader …
choose exactly one leader from the group with the restriction that the identity of the leader …
On the anonymity guarantees of anonymous proof-of-stake protocols
In proof-of-stake (PoS) blockchains, stakeholders that extend the chain are selected
according to the amount of stake they own. In S&P 2019 the" Ouroboros Crypsinous" system …
according to the amount of stake they own. In S&P 2019 the" Ouroboros Crypsinous" system …
Prifhete: Achieving full-privacy in account-based cryptocurrencies is possible
In cryptocurrencies, all transactions are public. For their adoption, it is important that these
transactions, while publicly verifiable, do not leak information about the identity and the …
transactions, while publicly verifiable, do not leak information about the identity and the …
Privacy in blockchain systems
Privacy of blockchains has been a matter of discussion since the inception of Bitcoin.
Various techniques with a varying degree of privacy protection and complexity have been …
Various techniques with a varying degree of privacy protection and complexity have been …