Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Indistinguishability obfuscation from well-founded assumptions
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …
programs into unintelligible ones while preserving functionality. It is a fascinating and …
Improved dual system ABE in prime-order groups via predicate encodings
We present a modular framework for the design of efficient adaptively secure attribute-based
encryption (ABE) schemes for a large class of predicates under the standard k-Lin …
encryption (ABE) schemes for a large class of predicates under the standard k-Lin …
Practical functional encryption for quadratic functions with applications to predicate encryption
We present two practically efficient functional encryption schemes for a large class of
quadratic functionalities. Specifically, our constructions enable the computation of so-called …
quadratic functionalities. Specifically, our constructions enable the computation of so-called …
Fully,(almost) tightly secure IBE and dual system groups
We present the first fully secure Identity-Based Encryption scheme (IBE) from the standard
assumptions where the security loss depends only on the security parameter and is …
assumptions where the security loss depends only on the security parameter and is …
Shorter quasi-adaptive NIZK proofs for linear subspaces
CS Jutla, A Roy - Journal of Cryptology, 2017 - Springer
We define a novel notion of quasi-adaptive non-interactive zero-knowledge (NIZK) proofs for
probability distributions on parameterized languages. It is quasi-adaptive in the sense that …
probability distributions on parameterized languages. It is quasi-adaptive in the sense that …
Identity-based matchmaking encryption from standard assumptions
In this work, we propose the first identity-based matchmaking encryption (IB-ME) scheme
under the standard assumptions in the standard model. This scheme is proven to be secure …
under the standard assumptions in the standard model. This scheme is proven to be secure …
Algebraic MACs and keyed-verification anonymous credentials
We consider the problem of constructing anonymous credentials for use in a setting where
the issuer of credentials is also the verifier, or more generally where the issuer and verifier …
the issuer of credentials is also the verifier, or more generally where the issuer and verifier …
Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares
Threshold cryptography is a fundamental distributed computational paradigm for enhancing
the availability and the security of cryptographic public-key schemes. It does it by dividing …
the availability and the security of cryptographic public-key schemes. It does it by dividing …
A practical and efficient bidirectional access control scheme for cloud-edge data sharing
The cloud computing paradigm provides numerous tempting advantages, enabling users to
store and share their data conveniently. However, users are naturally resistant to directly …
store and share their data conveniently. However, users are naturally resistant to directly …
Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques
S Yamada - Advances in Cryptology–CRYPTO 2017: 37th Annual …, 2017 - Springer
In this paper, we focus on the constructions of adaptively secure identity-based encryption
(IBE) from lattices and verifiable random function (VRF) with large input spaces. Existing …
(IBE) from lattices and verifiable random function (VRF) with large input spaces. Existing …