Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy-aware and security-enhanced efficient matchmaking encryption
Data sharing technologies enable users to outsource data and privately share information
with arbitrary recipients without geographic barriers. However, existing efforts for secure …
with arbitrary recipients without geographic barriers. However, existing efforts for secure …
A survey on functional encryption
Functional Encryption (FE) expands traditional public-key encryption in two different ways: it
supports fine-grained access control and allows learning a function of the encrypted data. In …
supports fine-grained access control and allows learning a function of the encrypted data. In …
Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications
G Wang, SF Sun, Z Wang, D Gu - IACR International Conference on …, 2023 - Springer
Functional encryption (FE for short) can be used to calculate a function output of a message,
without revealing other information about the message. There are mainly two types of …
without revealing other information about the message. There are mainly two types of …
Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings
M Wan, G Wang, SF Sun, D Gu - International Conference on Information …, 2023 - Springer
In this work, we investigate the possibility of constructing function-hiding predicate functional
encryption (FH-P-FE), which provides full attribute-hiding and function-hiding securities …
encryption (FH-P-FE), which provides full attribute-hiding and function-hiding securities …
Attack and improvement of a hidden vector encryption scheme
K Wang, Z Wang, S Luo, Z Guan - Proceedings of CECNet 2022, 2022 - ebooks.iospress.nl
Abstract Hidden Vector Encryption (HVE) is a new kind of attribute-based encryption in
which a vector is hidden in the ciphertext or linked with the secret key. In ESORICS 2014 …
which a vector is hidden in the ciphertext or linked with the secret key. In ESORICS 2014 …
Small superset and big subset obfuscation
SD Galbraith, T Li - Information Security and Privacy: 26th Australasian …, 2021 - Springer
Abstract Let S={1,\dots, n\} S= 1,⋯, n be a set of integers and X be a subset of S. We study
the boolean function f_X (Y) f X (Y) which outputs 1 if and only if Y is a small enough …
the boolean function f_X (Y) f X (Y) which outputs 1 if and only if Y is a small enough …
Obfuscation of evasive algebraic set membership
SD Galbraith, T Li - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We define the membership function of a set as the function that determines whether an input
is an element of the set. Canetti, Rothblum, and Varia showed how to obfuscate evasive …
is an element of the set. Canetti, Rothblum, and Varia showed how to obfuscate evasive …
[PDF][PDF] Efficient Function-Hiding Inner Product Functional Encryption and Its Application to Fine-grained Data Sharing
In a function-hiding inner product functional encryption (FH-IPFE) scheme, both secret keys
and ciphertexts are associated with vectors. Given a secret key for n-dimensional vector x …
and ciphertexts are associated with vectors. Given a secret key for n-dimensional vector x …
[PDF][PDF] Obfuscation of Big Subsets and Small Supersets as well as Conjunctions
SD Galbraith, T Li - iacr.steepath.eu
We obfuscate the big subset and small superset functionalities in a very simple way. We
prove both VBB and input-hiding in the standard model based on the subset product …
prove both VBB and input-hiding in the standard model based on the subset product …
[PDF][PDF] Situation-oriented databases: verifying electronic signatures of heterogeneous documents in a RESTful web service
AS Gusarenko - Modelirovanie, Optimizatsiya i Informatsionnye …, 2022 - scholar.archive.org
When focusing on modern conditions in the field of processing heterogeneous data based
on a situation-oriented approach, the task of using information systems with implemented …
on a situation-oriented approach, the task of using information systems with implemented …