Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However,
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …
Multi-dimensional range query over encrypted data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted
Data (MRQED), to address the privacy concerns related to the sharing of network audit logs …
Data (MRQED), to address the privacy concerns related to the sharing of network audit logs …
Fast and private computation of cardinality of set intersection and union
In many everyday scenarios, sensitive information must be shared between parties without
complete mutual trust. Private set operations are particularly useful to enable sharing …
complete mutual trust. Private set operations are particularly useful to enable sharing …
A secure data deduplication scheme for cloud storage
As more corporate and private users outsource their data to cloud storage providers, recent
data breach incidents make end-to-end encryption an increasingly prominent requirement …
data breach incidents make end-to-end encryption an increasingly prominent requirement …
Structure-aware private set intersection, with applications to fuzzy matching
In two-party private set intersection (PSI), Alice holds a set X, Bob holds a set Y, and they
learn (only) the contents of X∩ Y. We introduce structure-aware PSI protocols, which take …
learn (only) the contents of X∩ Y. We introduce structure-aware PSI protocols, which take …
Match me if you can: Matchmaking encryption and its applications
We introduce a new form of encryption that we name matchmaking encryption (ME). Using
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …
Fuzzy identity-based matchmaking encryption and its application
Ateniese et al. introduced the primitive of matchmaking encryption (ME) at CRYPTO 2019
and left open several important questions, which include extending ME to fuzzy cases or …
and left open several important questions, which include extending ME to fuzzy cases or …
Privacy, discovery, and authentication for the internet of things
Automatic service discovery is essential to realizing the full potential of the Internet of Things
(IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low …
(IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low …
Privacy-preserving profile matching for proximity-based mobile social networking
Proximity-based mobile social networking (PMSN) refers to the social interaction among
physically proximate mobile users. The first step toward effective PMSN is for mobile users to …
physically proximate mobile users. The first step toward effective PMSN is for mobile users to …
Shorter IBE and signatures via asymmetric pairings
Abstract We present efficient Identity-Based Encryption (IBE) and signature schemes under
the Symmetric External Diffie-Hellman (SXDH) assumption in bilinear groups. In both the IBE …
the Symmetric External Diffie-Hellman (SXDH) assumption in bilinear groups. In both the IBE …