Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Trapdoors for lattices: Simpler, tighter, faster, smaller
We give new methods for generating and using “strong trapdoors” in cryptographic lattices,
which are simultaneously simple, efficient, easy to implement (even in parallel), and …
which are simultaneously simple, efficient, easy to implement (even in parallel), and …
Worst-case to average-case reductions for module lattices
Most lattice-based cryptographic schemes are built upon the assumed hardness of the Short
Integer Solution (SIS) and Learning With Errors (LWE) problems. Their efficiencies can be …
Integer Solution (SIS) and Learning With Errors (LWE) problems. Their efficiencies can be …
[HTML][HTML] A survey on group signatures and ring signatures: Traceability vs. anonymity
MNS Perera, T Nakamura, M Hashimoto, H Yokoyama… - Cryptography, 2022 - mdpi.com
This survey reviews the two most prominent group-oriented anonymous signature schemes
and analyzes the existing approaches for their problem: balancing anonymity against …
and analyzes the existing approaches for their problem: balancing anonymity against …
Random oracles in a quantum world
The interest in post-quantum cryptography—classical systems that remain secure in the
presence of a quantum adversary—has generated elegant proposals for new cryptosystems …
presence of a quantum adversary—has generated elegant proposals for new cryptosystems …
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
An accumulator is a function that hashes a set of inputs into a short, constant-size string
while preserving the ability to efficiently prove the inclusion of a specific input element in the …
while preserving the ability to efficiently prove the inclusion of a specific input element in the …
A survey on lattice-based digital signature
F Liu, Z Zheng, Z Gong, K Tian, Y Zhang, Z Hu, J Li… - Cybersecurity, 2024 - Springer
Lattice-based digital signature has become one of the widely recognized post-quantum
algorithms because of its simple algebraic operation, rich mathematical foundation and …
algorithms because of its simple algebraic operation, rich mathematical foundation and …
Classical homomorphic encryption for quantum circuits
U Mahadev - SIAM Journal on Computing, 2020 - SIAM
We present the first leveled fully homomorphic encryption scheme for quantum circuits with
classical keys. The scheme allows a classical client to blindly delegate a quantum …
classical keys. The scheme allows a classical client to blindly delegate a quantum …
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios
Y Cao, S Xu, X Chen, Y He, S Jiang - Computer Networks, 2022 - Elsevier
Message authentication has been a research hotspot in current vehicular ad hoc networks
(VANETs). Many researchers adopt group signatures based on number-theoretic …
(VANETs). Many researchers adopt group signatures based on number-theoretic …
Secure identity-based encryption in the quantum random oracle model
M Zhandry - International Journal of Quantum Information, 2015 - World Scientific
We give the first proof of security for an identity-based encryption (IBE) scheme in the
quantum random oracle model. This is the first proof of security for any scheme in this model …
quantum random oracle model. This is the first proof of security for any scheme in this model …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …