Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Prio: Private, robust, and scalable computation of aggregate statistics
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
Revocable quantum timed-release encryption
D Unruh - Journal of the ACM (JACM), 2015 - dl.acm.org
Timed-release encryption is a kind of encryption scheme in which a recipient can decrypt
only after a specified amount of time T (assuming that we have a moderately precise …
only after a specified amount of time T (assuming that we have a moderately precise …
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
Consider an abstract storage device Σ(G) that can hold a single element x from a fixed,
publicly known finite group G. Storage is private in the sense that an adversary does not …
publicly known finite group G. Storage is private in the sense that an adversary does not …
Private analytics via streaming, sketching, and silently verifiable proofs
We present Whisper, a system for privacy-preserving collection of aggregate statistics. Like
prior systems, a Whisper deployment consists of a small set of non-colluding servers; these …
prior systems, a Whisper deployment consists of a small set of non-colluding servers; these …
Practical quantum anonymous private information retrieval based on quantum key distribution
YG Yang, BX Liu, GB Xu, YH Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Quantum Anonymous Private Information Retrieval (QAPIR) allows a user to retrieve an item
from a database anonymously thus achieving better user privacy. Recently, Khan et al …
from a database anonymously thus achieving better user privacy. Recently, Khan et al …
Algebraic manipulation detection codes
Algebraic manipulation detection codes are a cryptographic primitive that was introduced by
Cramer et al.(Eurocrypt 2008). It encompasses several methods that were previously used in …
Cramer et al.(Eurocrypt 2008). It encompasses several methods that were previously used in …
Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure
key distribution alone is insufficient for high-security communications. Often, knowing who …
key distribution alone is insufficient for high-security communications. Often, knowing who …
Anonymous quantum conference key agreement
Conference key agreement (CKA) is a cryptographic effort of multiple parties to establish a
shared secret key. In future quantum networks, generating secret keys in an anonymous way …
shared secret key. In future quantum networks, generating secret keys in an anonymous way …
Self-tallying quantum anonymous voting
Anonymous voting is a voting method of hiding the link between a vote and a voter, the
context of which ranges from governmental elections to decision making in small groups like …
context of which ranges from governmental elections to decision making in small groups like …
Secure anonymous conferencing in quantum networks
Users of quantum networks can securely communicate via so-called (quantum) conference
key agreement—making their identities publicly known. In certain circumstances, however …
key agreement—making their identities publicly known. In certain circumstances, however …