Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security in quantum cryptography
C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Ouroboros: A provably secure proof-of-stake blockchain protocol
We present “Ouroboros”, the first blockchain protocol based on proof of stake with rigorous
security guarantees. We establish security properties for the protocol comparable to those …
security guarantees. We establish security properties for the protocol comparable to those …
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
Emerging smart contract systems over decentralized cryptocurrencies allow mutually
distrustful parties to transact safely without trusted third parties. In the event of contractual …
distrustful parties to transact safely without trusted third parties. In the event of contractual …
Order-fairness for byzantine consensus
Decades of research in both cryptography and distributed systems has extensively studied
the problem of state machine replication, also known as Byzantine consensus. A consensus …
the problem of state machine replication, also known as Byzantine consensus. A consensus …
A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things
Internet-of-Things (IoT) are increasingly operating in the zero-trust environments where any
devices and systems may be compromised and hence untrusted. In addition, data collected …
devices and systems may be compromised and hence untrusted. In addition, data collected …
Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities
When two or more parties need to compute a common result while safeguarding their
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled …
Universal atomic swaps: Secure exchange of coins across all blockchains
SAK Thyagarajan, G Malavolta… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
Trading goods lies at the backbone of the modern economy and the recent advent of
cryptocurrencies has opened the door for trading decentralized (digital) assets: A large …
cryptocurrencies has opened the door for trading decentralized (digital) assets: A large …
Town crier: An authenticated data feed for smart contracts
Smart contracts are programs that execute autonomously on blockchains. Their key
envisioned uses (eg financial instruments) require them to consume data from outside the …
envisioned uses (eg financial instruments) require them to consume data from outside the …
Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability
We present a novel Proof-of-Stake (PoS) protocol, Ouroboros Genesis, that enables parties
to safely join (or rejoin) the protocol execution using only the genesis block information. Prior …
to safely join (or rejoin) the protocol execution using only the genesis block information. Prior …
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab
We document our experiences in teaching smart contract programming to undergraduate
students at the University of Maryland, the first pedagogical attempt of its kind. Since smart …
students at the University of Maryland, the first pedagogical attempt of its kind. Since smart …