Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
How to simulate it–a tutorial on the simulation proof technique
Y Lindell - Tutorials on the Foundations of Cryptography …, 2017 - Springer
One of the most fundamental notions of cryptography is that of simulation. It stands behind
the concepts of semantic security, zero knowledge, and security for multiparty computation …
the concepts of semantic security, zero knowledge, and security for multiparty computation …
High-frequency trading on decentralized on-chain exchanges
Decentralized exchanges (DEXs) allow parties to participate in financial markets while
retaining full custody of their funds. However, the transparency of blockchain-based DEX in …
retaining full custody of their funds. However, the transparency of blockchain-based DEX in …
Sok: Transparent dishonesty: front-running attacks on blockchain
We consider front-running to be a course of action where an entity benefits from prior access
to privileged market information about upcoming transactions and trades. Front-running has …
to privileged market information about upcoming transactions and trades. Front-running has …
Universally composable security: A new paradigm for cryptographic protocols
R Canetti - Proceedings 42nd IEEE Symposium on Foundations …, 2001 - ieeexplore.ieee.org
We propose a novel paradigm for defining security of cryptographic protocols, called
universally composable security. The salient property of universally composable definitions …
universally composable security. The salient property of universally composable definitions …
Efficient multiparty protocols using circuit randomization
D Beaver - Advances in Cryptology—CRYPTO'91: Proceedings 11, 1992 - Springer
The difference between theory and practice often rests on one major factor: efficiency. In
distributed systems, communication is usually expensive, and protocols designed for …
distributed systems, communication is usually expensive, and protocols designed for …
Security and composition of multiparty cryptographic protocols
R Canetti - Journal of CRYPTOLOGY, 2000 - Springer
We present general definitions of security for multiparty cryptographic protocols, with focus
on the task of evaluating a probabilistic function of the parties' inputs. We show that, with …
on the task of evaluating a probabilistic function of the parties' inputs. We show that, with …
[PDF][PDF] Secure multi-party computation
O Goldreich - Manuscript. Preliminary version, 1998 - Citeseer
More than ten years have elapsed since the rst completeness theorems for two-party and
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …
multi-party fault-tolerant computation have been announced (by Yao and Goldreich, Micali …
Secure multiparty computation for privacy preserving data mining
Y Lindell - Encyclopedia of data warehousing and mining, 2005 - igi-global.com
The increasing use of data-mining tools in both the public and private sectors raises
concerns regarding the potentially sensitive nature of much of the data being mined. The …
concerns regarding the potentially sensitive nature of much of the data being mined. The …
A forward-secure public-key encryption scheme
Cryptographic computations are often carried out on insecure devices for which the threat of
key exposure represents a serious and realistic concern. In an effort to mitigate the damage …
key exposure represents a serious and realistic concern. In an effort to mitigate the damage …
[PDF][PDF] Adaptively secure multi-party computation
A fundamental problem in designing secure multi-party protocols is how to deal with
adaptive adversaries (ie, adversaries that may choose the corrupted parties during the …
adaptive adversaries (ie, adversaries that may choose the corrupted parties during the …