Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Flamingo: Multi-round single-server secure aggregation with applications to private federated learning
This paper introduces Flamingo, a system for secure aggregation of data across a large set
of clients. In secure aggregation, a server sums up the private inputs of clients and obtains …
of clients. In secure aggregation, a server sums up the private inputs of clients and obtains …
[PDF][PDF] Chainlink 2.0: Next steps in the evolution of decentralized oracle networks
L Breidenbach, C Cachin, B Chan, A Coventry, S Ellis… - Chainlink Labs, 2021 - naorib.ir
In this whitepaper, we articulate a vision for the evolution of Chainlink beyond its initial
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …
conception in the original Chainlink whitepaper. We foresee an increasingly expansive role …
Transparent polynomial delegation and its applications to zero knowledge proof
We present a new succinct zero knowledge argument scheme for layered arithmetic circuits
without trusted setup. The prover time is O (C+ nlogn) and the proof size is O (D logC+ log 2 …
without trusted setup. The prover time is O (C+ nlogn) and the proof size is O (D logC+ log 2 …
Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability
We present CanDID, a platform for practical, user-friendly realization of decentralized
identity, the idea of empowering end users with management of their own credentials. While …
identity, the idea of empowering end users with management of their own credentials. While …
Can a public blockchain keep a secret?
Blockchains are gaining traction and acceptance, not just for cryptocurrencies, but
increasingly as an architecture for distributed computing. In this work we seek solutions that …
increasingly as an architecture for distributed computing. In this work we seek solutions that …
Redactable blockchain from decentralized chameleon hash functions
Blockchain is a technology with decentralization and immutability features and has been
employed for auditing by many applications. However, immutability sometimes limits the …
employed for auditing by many applications. However, immutability sometimes limits the …
Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling
Distributed Key Generation (DKG) is a technique to bootstrap threshold cryptosystems
without a trusted party. DKG is an essential building block to many decentralized protocols …
without a trusted party. DKG is an essential building block to many decentralized protocols …
Secure password-protected encryption key for deduplicated cloud storage systems
In this article, we propose SPADE, an encrypted data deduplication scheme that resists
compromised key servers and frees users from the key management problem. Specifically …
compromised key servers and frees users from the key management problem. Specifically …
Cobra: Dynamic proactive secret sharing for confidential bft services
Byzantine Fault-Tolerant (BFT) State Machine Replication (SMR) is a classical paradigm for
implementing trustworthy services that has received renewed interest with the emergence of …
implementing trustworthy services that has received renewed interest with the emergence of …
Fluid MPC: secure multiparty computation with dynamic participants
Existing approaches to secure multiparty computation (MPC) require all participants to
commit to the entire duration of the protocol. As interest in MPC continues to grow, it is …
commit to the entire duration of the protocol. As interest in MPC continues to grow, it is …