Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On instantiating unleveled fully-homomorphic signatures from falsifiable assumptions
We build the first unleveled fully homomorphic signature scheme in the standard model. Our
scheme is not constrained by any a-priori bound on the depth of the functions that can be …
scheme is not constrained by any a-priori bound on the depth of the functions that can be …
Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme
Over the development of modern cryptography, often, alternative cryptographic schemes are
developed to achieve goals that in some important respect are orthogonal. Thus, we have to …
developed to achieve goals that in some important respect are orthogonal. Thus, we have to …
On instantiating the algebraic group model from falsifiable assumptions
We provide a standard-model implementation (of a relaxation) of the algebraic group model
(AGM,[Fuchsbauer, Kiltz, Loss, CRYPTO 2018]). Specifically, we show that every algorithm …
(AGM,[Fuchsbauer, Kiltz, Loss, CRYPTO 2018]). Specifically, we show that every algorithm …
FgDAP: A blockchain-based privacy-enhanced decentralized anonymous payment system with fine-grained traceability
Y Wang - Computers and Electrical Engineering, 2024 - Elsevier
Abstract Decentralized Anonymous Payment (DAP) frameworks provide users with the
capability to securely and privately transfer cryptocurrencies. These frameworks enable …
capability to securely and privately transfer cryptocurrencies. These frameworks enable …
New constructions of statistical NIZKs: dual-mode DV-NIZKs and more
Non-interactive zero-knowledge proofs (NIZKs) are important primitives in cryptography. A
major challenge since the early works on NIZKs has been to construct NIZKs with a …
major challenge since the early works on NIZKs has been to construct NIZKs with a …
On Quantum Simulation-Soundness
Non-interactive zero-knowledge (NIZK) proof systems are a cornerstone of modern
cryptography, but their security has received little attention in the quantum settings …
cryptography, but their security has received little attention in the quantum settings …
Correlation-intractable hash functions via shift-hiding
A hash function family $\mathcal {H} $ is correlation intractable for a $ t $-input relation
$\mathcal {R} $ if, given a random function $ h $ chosen from $\mathcal {H} $, it is hard to …
$\mathcal {R} $ if, given a random function $ h $ chosen from $\mathcal {H} $, it is hard to …
[PDF][PDF] Multi-Input Correlation-Intractable Hash Functions via Shift-Hiding.
A hash function family H is correlation intractable for a t-input relation R if, given a random
function h chosen from H, it is hard to find x1,..., xt such that R (x1,..., xt, h (x1),..., h (xt)) is …
function h chosen from H, it is hard to find x1,..., xt such that R (x1,..., xt, h (x1),..., h (xt)) is …
On Abstract Models in Cryptography and Their Applications
J Kastner - 2024 - research-collection.ethz.ch
When talking about the security of a cryptographic scheme, researchers often model it as a
game between a challenger and an adversary. Such a game gives a clear description of the …
game between a challenger and an adversary. Such a game gives a clear description of the …