Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security of the Fiat-Shamir transformation in the quantum random-oracle model
Abstract The famous Fiat-Shamir transformation turns any public-coin three-round interactive
proof, ie, any so-called Σ-protocol, into a non-interactive proof in the random-oracle model …
proof, ie, any so-called Σ-protocol, into a non-interactive proof in the random-oracle model …
A Compressed -Protocol Theory for Lattices
We show a lattice-based solution for commit-and-prove transparent circuit zero-knowledge
(ZK) with polylog-communication, the first not depending on PCPs. We start from …
(ZK) with polylog-communication, the first not depending on PCPs. We start from …
Online-extractability in the quantum random-oracle model
We show the following generic result: When a quantum query algorithm in the quantum
random-oracle model outputs a classical value t that is promised to be in some tight relation …
random-oracle model outputs a classical value t that is promised to be in some tight relation …
A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling
R del Pino, S Katsumata - Annual International Cryptology Conference, 2022 - Springer
Blind signatures, proposed by Chaum (CRYPTO'82), are interactive protocols between a
signer and a user, where a user can obtain a signature without revealing the message to be …
signer and a user, where a user can obtain a signature without revealing the message to be …
Spartan and bulletproofs are simulation-extractable (for free!)
Increasing deployment of advanced zero-knowledge proof systems, especially zkSNARKs,
has raised critical questions about their security against real-world attacks. Two classes of …
has raised critical questions about their security against real-world attacks. Two classes of …
A non-PCP approach to succinct quantum-safe zero-knowledge
Today's most compact zero-knowledge arguments are based on the hardness of the discrete
logarithm problem and related classical assumptions. If one is interested in quantum-safe …
logarithm problem and related classical assumptions. If one is interested in quantum-safe …
Shorter signatures based on tailor-made minimalist symmetric-key crypto
Signature schemes based on the MPC-in-the-head approach (MPCitH) have either been
designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic …
designed by taking a proof system and selecting a suitable symmetric-key primitive (Picnic …
SMILE: set membership from ideal lattices with applications to ring signatures and confidential transactions
In a set membership proof, the public information consists of a set of elements and a
commitment. The prover then produces a zero-knowledge proof showing that the …
commitment. The prover then produces a zero-knowledge proof showing that the …
Banquet: Short and fast signatures from AES
This work introduces Banquet, a digital signature scheme with post-quantum security,
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …
constructed using only symmetric-key primitives. The design is based on the MPC-in-head …
Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices
With the emergence of quantum computers, traditional cryptographic methods are
vulnerable to attacks, emphasizing the need for post-quantum cryptography to secure …
vulnerable to attacks, emphasizing the need for post-quantum cryptography to secure …