Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Threshold raccoon: Practical threshold signatures from standard lattice assumptions
Threshold signatures improve both availability and security of digital signatures by splitting
the signing key into N shares handed out to different parties. Later on, any subset of at least …
the signing key into N shares handed out to different parties. Later on, any subset of at least …
Two-round threshold signature from algebraic one-more learning with errors
Threshold signatures have recently seen a renewed interest due to applications in
cryptocurrency while NIST has released a call for multi-party threshold schemes, with a …
cryptocurrency while NIST has released a call for multi-party threshold schemes, with a …
Adaptively Secure 5 Round Threshold Signatures from and with Rewinding
T-out-of-N threshold signatures have recently seen a renewed interest, with various types
now available, each offering different tradeoffs. However, one property that has remained …
now available, each offering different tradeoffs. However, one property that has remained …
Loquat: a SNARK-friendly post-quantum signature based on the legendre PRF with applications in ring and aggregate signatures
We design and implement a novel post-quantum signature scheme based on the Legendre
PRF, named Loquat. Prior to this work, efficient approaches for constructing post-quantum …
PRF, named Loquat. Prior to this work, efficient approaches for constructing post-quantum …
Efficient linkable ring signatures: new framework and post-quantum instantiations
In this paper, we introduce a new framework for constructing linkable ring signatures (LRS).
Our framework is based purely on signatures of knowledge (SoK) which allows one to issue …
Our framework is based purely on signatures of knowledge (SoK) which allows one to issue …
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy
The hardness of lattice problems offers one of the most promising security foundations for
quantum-safe cryptography. Basic schemes for public key encryption and digital signatures …
quantum-safe cryptography. Basic schemes for public key encryption and digital signatures …
Merkle tree ladder mode: reducing the size impact of NIST PQC signature algorithms in practice
A Fregly, J Harvey, BS Kaliski Jr, S Sheth - Cryptographers' Track at the …, 2023 - Springer
Abstract We introduce the Merkle Tree Ladder (MTL) mode of operation for signature
schemes. MTL mode signs messages using an underlying signature scheme in such a way …
schemes. MTL mode signs messages using an underlying signature scheme in such a way …
Hash-Based Multi-Signatures for Post-Quantum Ethereum
With the threat posed by quantum computers on the horizon, systems like Ethereum must
transition to cryptographic primitives resistant to quantum attacks. One of the most critical of …
transition to cryptographic primitives resistant to quantum attacks. One of the most critical of …
Post-quantum privacy pass via post-quantum anonymous credentials
It is known that one can generically construct a post-quantum anonymous credential
scheme, supporting the showing of arbitrary predicates on its attributes using general …
scheme, supporting the showing of arbitrary predicates on its attributes using general …
Improving bitcoin's post-quantum transaction efficiency with a novel lattice-based aggregate signature scheme based on CRYSTALS-dilithium and a STARK protocol
Y Quan - IEEE Access, 2022 - ieeexplore.ieee.org
This paper proposes a novel lattice-based aggregate signature (LAS) scheme that brings
post-quantum security to the Bitcoin system without sacrificing its transaction efficiency …
post-quantum security to the Bitcoin system without sacrificing its transaction efficiency …