Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Batching techniques for accumulators with applications to IOPs and stateless blockchains
We present batching techniques for cryptographic accumulators and vector commitments in
groups of unknown order. Our techniques are tailored for distributed settings where no …
groups of unknown order. Our techniques are tailored for distributed settings where no …
Proofs, arguments, and zero-knowledge
J Thaler - Foundations and Trends® in Privacy and Security, 2022 - nowpublishers.com
Interactive proofs (IPs) and arguments are cryptographic protocols that enable an untrusted
prover to provide a guarantee that it performed a requested computation correctly …
prover to provide a guarantee that it performed a requested computation correctly …
Optimal structure-preserving signatures in asymmetric bilinear groups
M Abe, J Groth, K Haralambiev, M Ohkubo - … CA, USA, August 14-18, 2011 …, 2011 - Springer
Abstract Structure-preserving signatures are signatures defined over bilinear groups that
rely on generic group operations. In particular, the messages and signatures consist of …
rely on generic group operations. In particular, the messages and signatures consist of …
Succinct zero-knowledge batch proofs for set accumulators
Cryptographic accumulators are a common solution to proving information about a large set
S. They allow one to compute a short digest of S and short certificates of some of its basic …
S. They allow one to compute a short digest of S and short certificates of some of its basic …
Distributed paillier cryptosystem without trusted dealer
T Nishide, K Sakurai - International Workshop on Information Security …, 2010 - Springer
We propose a distributed key generation protocol for the threshold Paillier cryptosystem.
Often in the multiparty computation based on the threshold Paillier cryptosystem, the …
Often in the multiparty computation based on the threshold Paillier cryptosystem, the …
Cicada: A framework for private non-interactive on-chain auctions and voting
Auction and voting schemes play a crucial role in the Web3 ecosystem. Yet currently
deployed implementations either lack privacy or require at least two rounds, hindering …
deployed implementations either lack privacy or require at least two rounds, hindering …
[PDF][PDF] Secure multiparty computation of threshold signatures made more efficient
HWH Wong, JPK Ma… - ISOC Network and …, 2024 - ndss-symposium.org
Threshold signatures, notably ECDSA, are fundamental for securing decentralized
applications. Their non-linear structure poses challenges in distributed signing, often tackled …
applications. Their non-linear structure poses challenges in distributed signing, often tackled …
A-poa: Anonymous proof of authorization for decentralized identity management
Self-sovereign Identity Management (SSIM) pro-motes self-control of credentials without
relying on external administration. However, the state-of-the-art SSIM based on …
relying on external administration. However, the state-of-the-art SSIM based on …
A machine-checked formalization of sigma-protocols
Zero-knowledge proofs have a vast applicability in the domain of cryptography, stemming
from the fact that they can be used to force potentially malicious parties to abide by the rules …
from the fact that they can be used to force potentially malicious parties to abide by the rules …
An airdrop that preserves recipient privacy
A common approach to bootstrap** a new cryptocurrency is an airdrop, an arrangement in
which existing users give away currency to entice new users to join. But current airdrops …
which existing users give away currency to entice new users to join. But current airdrops …