Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
Recently, Halevi et al.(CCS'11) proposed a cryptographic primitive called proofs of
ownership (PoW) to enhance security of client-side deduplication in cloud storage. In a proof …
ownership (PoW) to enhance security of client-side deduplication in cloud storage. In a proof …
On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography
A natural and recurring idea in the knapsack/lattice cryptography literature is to start from a
lattice with remarkable decoding capability as your private key, and hide it somehow to …
lattice with remarkable decoding capability as your private key, and hide it somehow to …
Maximization of extractable randomness in a quantum random-number generator
The generation of random numbers via quantum processes is an efficient and reliable
method to obtain true indeterministic random numbers that are of vital importance to …
method to obtain true indeterministic random numbers that are of vital importance to …
Quietot: Lightweight oblivious transfer with a public-key setup
Oblivious Transfer (OT) is at the heart of secure computation and is a foundation for many
applications in cryptography. Over two decades of work have led to extremely efficient …
applications in cryptography. Over two decades of work have led to extremely efficient …
Computational fuzzy extractors
Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined
information-theoretically, with gaps between known negative results, existential …
information-theoretically, with gaps between known negative results, existential …
Wave: A new family of trapdoor one-way preimage sampleable functions based on codes
We present here a new family of trapdoor one-way functions that are Preimage Sampleable
on Average (PSA) based on codes, the Wave-PSA family. The trapdoor function is one-way …
on Average (PSA) based on codes, the Wave-PSA family. The trapdoor function is one-way …
Efficient fuzzy extraction of PUF-induced secrets: Theory and applications
The device-unique response of a physically unclonable function (PUF) can serve as the root
of trust in an embedded cryptographic system. Fuzzy extractors transform this noisy non …
of trust in an embedded cryptographic system. Fuzzy extractors transform this noisy non …
Collusion resistant traitor tracing from learning with errors
In this work we provide a traitor tracing construction with ciphertexts that grow polynomially
in log (n) where n is the number of users and prove it secure under the Learning with Errors …
in log (n) where n is the number of users and prove it secure under the Learning with Errors …
Efficient and provable white-box primitives
In recent years there have been several attempts to build white-box block ciphers whose
implementations aim to be incompressible. This includes the weak white-box ASASA …
implementations aim to be incompressible. This includes the weak white-box ASASA …
Non-interactive zero-knowledge from non-interactive batch arguments
Zero-knowledge and succinctness are two important properties that arise in the study of non-
interactive arguments. Previously, Kitagawa et al.(TCC 2020) showed how to obtain a non …
interactive arguments. Previously, Kitagawa et al.(TCC 2020) showed how to obtain a non …