Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security in quantum cryptography
C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Ouroboros: A provably secure proof-of-stake blockchain protocol
We present “Ouroboros”, the first blockchain protocol based on proof of stake with rigorous
security guarantees. We establish security properties for the protocol comparable to those …
security guarantees. We establish security properties for the protocol comparable to those …
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
Emerging smart contract systems over decentralized cryptocurrencies allow mutually
distrustful parties to transact safely without trusted third parties. In the event of contractual …
distrustful parties to transact safely without trusted third parties. In the event of contractual …
Order-fairness for byzantine consensus
Decades of research in both cryptography and distributed systems has extensively studied
the problem of state machine replication, also known as Byzantine consensus. A consensus …
the problem of state machine replication, also known as Byzantine consensus. A consensus …
A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things
Internet-of-Things (IoT) are increasingly operating in the zero-trust environments where any
devices and systems may be compromised and hence untrusted. In addition, data collected …
devices and systems may be compromised and hence untrusted. In addition, data collected …
Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
Universal atomic swaps: Secure exchange of coins across all blockchains
Trading goods lies at the backbone of the modern economy and the recent advent of
cryptocurrencies has opened the door for trading decentralized (digital) assets: A large …
cryptocurrencies has opened the door for trading decentralized (digital) assets: A large …
Town crier: An authenticated data feed for smart contracts
Smart contracts are programs that execute autonomously on blockchains. Their key
envisioned uses (eg financial instruments) require them to consume data from outside the …
envisioned uses (eg financial instruments) require them to consume data from outside the …
Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability
We present a novel Proof-of-Stake (PoS) protocol, Ouroboros Genesis, that enables parties
to safely join (or rejoin) the protocol execution using only the genesis block information. Prior …
to safely join (or rejoin) the protocol execution using only the genesis block information. Prior …
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab
We document our experiences in teaching smart contract programming to undergraduate
students at the University of Maryland, the first pedagogical attempt of its kind. Since smart …
students at the University of Maryland, the first pedagogical attempt of its kind. Since smart …