Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
FAME: Fast attribute-based message encryption
Time and again, attribute-based encryption has been shown to be the natural cryptographic
tool for building various types of conditional access systems with far-reaching applications …
tool for building various types of conditional access systems with far-reaching applications …
How to obfuscate programs directly
J Zimmerman - Annual International Conference on the Theory and …, 2015 - Springer
We propose a new way to obfuscate programs, via composite-order multilinear maps. Our
construction operates directly on straight-line programs (arithmetic circuits), rather than …
construction operates directly on straight-line programs (arithmetic circuits), rather than …
Dual system encryption framework in prime-order groups via computational pair encodings
N Attrapadung - Advances in Cryptology–ASIACRYPT 2016: 22nd …, 2016 - Springer
We propose a new generic framework for achieving fully secure attribute based encryption
(ABE) in prime-order bilinear groups. Previous generic frameworks by Wee (TCC'14) and …
(ABE) in prime-order bilinear groups. Previous generic frameworks by Wee (TCC'14) and …
The kernel matrix Diffie-Hellman assumption
We put forward a new family of computational assumptions, the Kernel Matrix Diffie-Hellman
Assumption. Given some matrix A sampled from some distribution D, the kernel assumption …
Assumption. Given some matrix A sampled from some distribution D, the kernel assumption …
A study of pair encodings: predicate encryption in prime order groups
Pair encodings and predicate encodings, recently introduced by Attrapadung [2] and Wee
[36] respectively, greatly simplify the process of designing and analyzing predicate and …
[36] respectively, greatly simplify the process of designing and analyzing predicate and …
Simplifying design and analysis of complex predicate encryption schemes
Abstract Wee (TCC'14) and Attrapadung (Eurocrypt'14) introduced predicate and pair
encodings, respectively, as a simple way to construct and analyze attribute-based …
encodings, respectively, as a simple way to construct and analyze attribute-based …
A framework for identity-based encryption with almost tight security
We show a framework for constructing identity-based encryption (IBE) schemes that are
(almost) tightly secure in the multi-challenge and multi-instance setting. In particular, we …
(almost) tightly secure in the multi-challenge and multi-instance setting. In particular, we …
Efficient two-level homomorphic encryption in prime-order bilinear groups and a fast implementation in webassembly
We construct an efficient two-level homomorphic public-key encryption in prime-order
bilinear groups. Such a scheme supports polynomially many homomorphic additions and …
bilinear groups. Such a scheme supports polynomially many homomorphic additions and …
[KNJIGA][B] Advances in Cryptology–EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia …
E Oswald, M Fischlin - 2015 - books.google.com
The two-volume proceedings LNCS 9056+ 9057 constitutes the proceedings of the 34th
Annual International Conference on the Theory and Applications of Cryptographic …
Annual International Conference on the Theory and Applications of Cryptographic …
BBA+ Improving the Security and Applicability of Privacy-Preserving Point Collection
G Hartung, M Hoffmann, M Nagel, A Rupp - Proceedings of the 2017 …, 2017 - dl.acm.org
Black-box accumulation (BBA) has recently been introduced as a building-block for a variety
of user-centric protocols such as loyalty, refund, and incentive systems. Loosely speaking …
of user-centric protocols such as loyalty, refund, and incentive systems. Loosely speaking …