Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Private set intersection: A systematic literature review
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …
parties to compute a function on their private inputs, obtaining the output at the end and …
Efficient laconic cryptography from learning with errors
Laconic cryptography is an emerging paradigm that enables cryptographic primitives with
sublinear communication complexity in just two messages. In particular, a two-message …
sublinear communication complexity in just two messages. In particular, a two-message …
Efficient CCA timed commitments in class groups
SAK Thyagarajan, G Castagnos… - Proceedings of the …, 2021 - dl.acm.org
Timed commitments Boneh and Naor, CRYPTO 2000 are the timed analogue of standard
commitments, where the commitment can be non-interactively opened after a pre-specified …
commitments, where the commitment can be non-interactively opened after a pre-specified …
Fuzzy private set intersection with large hyperballs
Traditional private set intersection (PSI) involves a receiver and a sender holding sets X and
Y, respectively, with the receiver learning only the intersection X∩ Y. We turn our attention to …
Y, respectively, with the receiver learning only the intersection X∩ Y. We turn our attention to …
Laconic private set-intersection from pairings
Private set-intersection (PSI) is one of the most practically relevant special-purpose secure
multiparty computation tasks, as it is motivated by many real-world applications. In this paper …
multiparty computation tasks, as it is motivated by many real-world applications. In this paper …
End-to-End Secure Messaging with Traceability Only for Illegal Content
As end-to-end encrypted messaging services become widely adopted, law enforcement
agencies have increasingly expressed concern that such services interfere with their ability …
agencies have increasingly expressed concern that such services interfere with their ability …
Computation efficient structure-aware psi from incremental function secret sharing
Abstract Structure-Aware Private Set Intersection (sa-PSI), recently introduced by Garimella
et al.(Crypto'22), is a PSI variant where Alice's input set SA has a publicly known structure …
et al.(Crypto'22), is a PSI variant where Alice's input set SA has a publicly known structure …
Sublinear secure computation from new assumptions
Secure computation enables mutually distrusting parties to jointly compute a function on
their secret inputs, while revealing nothing beyond the function output. A long-running …
their secret inputs, while revealing nothing beyond the function output. A long-running …
Batch-OT with optimal rate
We show that it is possible to perform n independent copies of 1-out-of-2 oblivious transfer in
two messages, where the communication complexity of the receiver and sender (each) is n …
two messages, where the communication complexity of the receiver and sender (each) is n …
Efficient set membership encryption and applications
The emerging area of laconic cryptography [Cho et al., CRYPTO'17] involves the design of
two-party protocols involving a sender and a receiver, where the receiver's input is large …
two-party protocols involving a sender and a receiver, where the receiver's input is large …