Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain access privacy: Challenges and directions
Privacy, facilitated by a confluence of cryptography and decentralization, is one of the
primary motivations for the adoption of cryptocurrencies like Bitcoin. Alas, Bitcoins privacy …
primary motivations for the adoption of cryptocurrencies like Bitcoin. Alas, Bitcoins privacy …
One server for the price of two: Simple and fast {Single-Server} private information retrieval
We present SimplePIR, the fastest single-server private information retrieval scheme known
to date. SimplePIR's security holds under the learning-with-errors assumption. To answer a …
to date. SimplePIR's security holds under the learning-with-errors assumption. To answer a …
A pragmatic introduction to secure multi-party computation
Secure multi-party computation (MPC) has evolved from a theoretical curiosity in the 1980s
to a tool for building real systems today. Over the past decade, MPC has been one of the …
to a tool for building real systems today. Over the past decade, MPC has been one of the …
Spiral: Fast, high-rate single-server PIR via FHE composition
We introduce the SPIRAL family of single-server private information retrieval (PIR) protocols.
SPIRAL relies on a composition of two lattice-based homomorphic encryption schemes: the …
SPIRAL relies on a composition of two lattice-based homomorphic encryption schemes: the …
Efficient pseudorandom correlation generators: Silent OT extension and more
Secure multiparty computation (MPC) often relies on correlated randomness for better
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …
efficiency and simplicity. This is particularly useful for MPC with no honest majority, where …
Prio: Private, robust, and scalable computation of aggregate statistics
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
Efficient two-round OT extension and silent non-interactive secure computation
We consider the problem of securely generating useful instances of two-party correlations,
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
such as many independent copies of a random oblivious transfer (OT) correlation, using a …
Function secret sharing: Improvements and extensions
Function Secret Sharing (FSS), introduced by Boyle et al.(Eurocrypt 2015), provides a way
for additively secret-sharing a function from a given function family F. More concretely, an m …
for additively secret-sharing a function from a given function family F. More concretely, an m …
Function secret sharing
Motivated by the goal of securely searching and updating distributed data, we introduce and
study the notion of function secret sharing (FSS). This new notion is a natural generalization …
study the notion of function secret sharing (FSS). This new notion is a natural generalization …
Piano: extremely simple, single-server PIR with sublinear server computation
We construct a sublinear-time single-server preprocessing Private Information Retrieval
(PIR) scheme with an optimal tradeoff between client storage and server computation (up to …
(PIR) scheme with an optimal tradeoff between client storage and server computation (up to …