Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
SoK: oblivious pseudorandom functions
S Casacuberta, J Hesse… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
In recent years, oblivious pseudorandom functions (OPRFs) have become a ubiquitous
primitive used in cryptographic protocols and privacy-preserving technologies. The growing …
primitive used in cryptographic protocols and privacy-preserving technologies. The growing …
Round-optimal password-protected secret sharing and T-PAKE in the password-only model
Abstract In a Password-Protected Secret Sharing (PPSS) scheme with parameters (t,
n)(formalized by Bagherzandi et al.[2]), a user Alice stores secret information among n …
n)(formalized by Bagherzandi et al.[2]), a user Alice stores secret information among n …
Highly-efficient and composable password-protected secret sharing (or: How to protect your bitcoin wallet online)
PPSS is a central primitive introduced by Bagherzandi et al.[2] which allows a user to store a
secret among n servers such that the user can later reconstruct the secret with the sole …
secret among n servers such that the user can later reconstruct the secret with the sole …
Sok: Privacy-enhancing technologies in finance
Recent years have seen the emergence of practical advanced cryptographic tools that not
only protect data privacy and authenticity, but also allow for jointly processing data from …
only protect data privacy and authenticity, but also allow for jointly processing data from …
PASTA: password-based threshold authentication
Token-based authentication is commonly used to enable a single-sign-on experience on the
web, in mobile applications and on enterprise networks using a wide range of open …
web, in mobile applications and on enterprise networks using a wide range of open …
A key protection scheme based on secret sharing for blockchain-based construction supply chain system
F **ong, R **ao, W Ren, R Zheng, J Jiang - IEEE access, 2019 - ieeexplore.ieee.org
Traditional construction supply chains suffer from extra delays, costs and information
wastages due to information intermediaries. Blockchain, a decentralized infrastructure, can …
wastages due to information intermediaries. Blockchain, a decentralized infrastructure, can …
Eagle: Efficient privacy preserving smart contracts
Abstract The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous
Organisations (DAO), which in current form are exposed to front-running of token …
Organisations (DAO), which in current form are exposed to front-running of token …
Decentralized finance (DeFi): A survey
Decentralized Finance (DeFi) is a new paradigm in the creation, distribution, and utilization
of financial services via the integration of blockchain technology. Our research conducts a …
of financial services via the integration of blockchain technology. Our research conducts a …
TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF
We present TOPPSS, the most efficient Password-Protected Secret Sharing (PPSS) scheme
to date. A (t, n)-threshold PPSS, introduced by Bagherzandi et al. 4, allows a user to share a …
to date. A (t, n)-threshold PPSS, introduced by Bagherzandi et al. 4, allows a user to share a …
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
Single Sign-On (SSO) is becoming an increasingly popular authentication method for users
that leverages a trusted Identity Provider (IdP) to bootstrap secure authentication tokens from …
that leverages a trusted Identity Provider (IdP) to bootstrap secure authentication tokens from …