Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Bilateral control for secure communication against replay attack in ORAN-based vehicular networks
Z Peng, C Peng, Y Tian, H Ding - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Open radio access network (ORAN)-based vehicular networks play a pivotal role in future
traffic data sharing. Due to the openness of the ORAN framework, it is necessary to encrypt …
traffic data sharing. Due to the openness of the ORAN framework, it is necessary to encrypt …
Transferable E-cash: A cleaner model and the first practical instantiation
Transferable e-cash is the most faithful digital analog of physical cash, as it allows users to
transfer coins between them in isolation, that is, without interacting with a bank or a “ledger” …
transfer coins between them in isolation, that is, without interacting with a bank or a “ledger” …
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
In this work we resolve the open problem raised by Prabhakaran and Rosulek at CRYPTO
2007, and present the first anonymous, rerandomizable, Replayable-CCA (RCCA) secure …
2007, and present the first anonymous, rerandomizable, Replayable-CCA (RCCA) secure …
Mix-nets from re-randomizable and replayable CCA-secure public-key encryption
Mix-nets are protocols that allow a set of senders to send messages anonymously. Faonio et
al.(ASIACRYPT'19) showed how to instantiate mix-net protocols based on Public-Verifiable …
al.(ASIACRYPT'19) showed how to instantiate mix-net protocols based on Public-Verifiable …
Improving the efficiency of re-randomizable and replayable CCA secure public key encryption
Public key encryption schemes that are simultaneously re-randomizable and replayable
CCA (Rand-RCCA) secure offer a unique combination of malleability and non-malleability …
CCA (Rand-RCCA) secure offer a unique combination of malleability and non-malleability …
NIWI and new notions of extraction for algebraic languages
We give an efficient construction of a computational non-interactive witness
indistinguishable (NIWI) proof in the plain model, and investigate notions of extraction for …
indistinguishable (NIWI) proof in the plain model, and investigate notions of extraction for …
Secure anonymous communication on corrupted machines with reverse firewalls
Y Wang, R Chen, X Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Snowden revelations in 2013 showed that user machines running cryptographic
protocols might be stealthily corrupted by attackers (eg, manufacturers and supply-chain …
protocols might be stealthily corrupted by attackers (eg, manufacturers and supply-chain …
A non-interactive shuffle argument with low trust assumptions
A Aggelakis, P Fauzi, G Korfiatis, P Louridas… - Topics in Cryptology–CT …, 2020 - Springer
A shuffle argument is a cryptographic primitive for proving correct behaviour of mix-networks
without leaking any private information. Several recent constructions of non-interactive …
without leaking any private information. Several recent constructions of non-interactive …
Scalable Mixnets from Two-Party Mercurial Signatures on Randomizable Ciphertexts
M Abe, M Nanri, M Ohkubo, OP Kempner… - Cryptology ePrint …, 2024 - eprint.iacr.org
A mixnet developed by Hébant et al.(PKC'20) employs certified ciphertexts that carry
homomorphic signatures from an authority, reducing the complexity of the shuffling proof …
homomorphic signatures from an authority, reducing the complexity of the shuffling proof …
Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption
Re-randomizable Replayable CCA-secure public key encryption (Rand-RCCA PKE)
schemes guarantee security against chosen-ciphertext attacks while ensuring the useful …
schemes guarantee security against chosen-ciphertext attacks while ensuring the useful …