Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Ferret: Fast extension for correlated OT with small communication
Correlated oblivious transfer (COT) is a crucial building block for secure multi-party
computation (MPC) and can be generated efficiently via OT extension. Recent works based …
computation (MPC) and can be generated efficiently via OT extension. Recent works based …
SCRAPE: Scalable randomness attested by public entities
Uniform randomness beacons whose output can be publicly attested to be unbiased are
required in several cryptographic protocols. A common approach to building such beacons …
required in several cryptographic protocols. A common approach to building such beacons …
SoftSpokenOT: Quieter OT extension from small-field silent VOLE in the minicrypt model
L Roy - Annual International Cryptology Conference, 2022 - Springer
Given a small number of base oblivious transfers (OTs), how does one generate a large
number of extended OTs as efficiently as possible? The answer has long been the seminal …
number of extended OTs as efficiently as possible? The answer has long been the seminal …
ALBATROSS: publicly attestable batched randomness based on secret sharing
In this paper we present ALBATROSS, a family of multiparty randomness generation
protocols with guaranteed output delivery and public verification that allows to trade off …
protocols with guaranteed output delivery and public verification that allows to trade off …
Proximity gaps for Reed–Solomon codes
A collection of sets displays a proximity gap with respect to some property if for every set in
the collection, either (i) all members are δ-close to the property in relative Hamming distance …
the collection, either (i) all members are δ-close to the property in relative Hamming distance …
Low cost constant round MPC combining BMR and oblivious transfer
In this work, we present two new actively secure, constant-round multi-party computation
(MPC) protocols with security against all-but-one corruptions. Our protocols both start with …
(MPC) protocols with security against all-but-one corruptions. Our protocols both start with …
Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection
This paper describes a 1-out-of-N oblivious transfer (OT) extension protocol with active
security, which achieves very low overhead on top of the passively secure protocol of …
security, which achieves very low overhead on top of the passively secure protocol of …
Arya: Nearly linear-time zero-knowledge proofs for correct program execution
There have been tremendous advances in reducing interaction, communication and
verification time in zero-knowledge proofs but it remains an important challenge to make the …
verification time in zero-knowledge proofs but it remains an important challenge to make the …
Linear-time zero-knowledge proofs for arithmetic circuit satisfiability
We give computationally efficient zero-knowledge proofs of knowledge for arithmetic circuit
satisfiability over a large field. For a circuit with N addition and multiplication gates, the …
satisfiability over a large field. For a circuit with N addition and multiplication gates, the …
More efficient MPC from improved triple generation and authenticated garbling
K Yang, X Wang, J Zhang - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Recent works on distributed garbling have provided highly efficient solutions for constant-
round MPC tolerating an arbitrary number of corruptions. In this work, we improve upon state …
round MPC tolerating an arbitrary number of corruptions. In this work, we improve upon state …