Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Selective disclosure in digital credentials: A review
Digital credentials represent digital versions of physical credentials. They are the
cornerstone of digital identity on the Internet. In order to enhance privacy, different authors …
cornerstone of digital identity on the Internet. In order to enhance privacy, different authors …
Proofs for inner pairing products and applications
We present a generalized inner product argument and demonstrate its applications to
pairing-based languages. We apply our generalized argument to prove that an inner pairing …
pairing-based languages. We apply our generalized argument to prove that an inner pairing …
With a little help from my friends: Constructing practical anonymous credentials
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …
services, when simultaneously aiming for strong privacy guarantees of users combined with …
ZAMA: A ZKP-based anonymous mutual authentication scheme for the IoV
N **, W Li, L **g, J Ma - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is a typical application of mobile Internet of Things (IoT), which
aims to improve road conditions and enhance the driving experience. However, the issue of …
aims to improve road conditions and enhance the driving experience. However, the issue of …
Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
Anonymous attribute-based credentials (ABCs) are a powerful tool allowing users to
authenticate while maintaining privacy. When instantiated from structure-preserving …
authenticate while maintaining privacy. When instantiated from structure-preserving …
Aggregate signatures with versatile randomization and issuer-hiding multi-authority anonymous credentials
Anonymous credentials (AC) offer privacy in user-centric identity management. They enable
users to authenticate anonymously, revealing only necessary attributes. With the rise of …
users to authenticate anonymously, revealing only necessary attributes. With the rise of …
Sok: data sovereignty
Society appears to be on the verge of recognizing the need for control over sensitive data in
modern web applications. Recently, many systems claim to give control to individuals …
modern web applications. Recently, many systems claim to give control to individuals …
Composable and modular anonymous credentials: Definitions and practical constructions
It takes time for theoretical advances to get used in practical schemes. Anonymous
credential schemes are no exception. For instance, existing schemes suited for real-world …
credential schemes are no exception. For instance, existing schemes suited for real-world …
Efficient redactable signature and application to anonymous credentials
O Sanders - IACR international conference on public-key …, 2020 - Springer
Let us assume that Alice has received a constant-size signature on a set of messages {m_i\}
_ i= 1^ n from some organization. Depending on the situation, Alice might need to disclose …
_ i= 1^ n from some organization. Depending on the situation, Alice might need to disclose …
[PDF][PDF] ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi.
ZEBRA is an Anonymous Credential (AC) scheme, supporting auditability and revocation,
that provides practical on-chain verification for the first time. It realizes efficient access …
that provides practical on-chain verification for the first time. It realizes efficient access …