Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
PIR with compressed queries and amortized query processing
Private information retrieval (PIR) is a key building block in many privacy-preserving
systems. Unfortunately, existing constructions remain very expensive. This paper introduces …
systems. Unfortunately, existing constructions remain very expensive. This paper introduces …
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
In this work, we show how to use indistinguishability obfuscation to build multiparty key
exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy …
exchange, efficient broadcast encryption, and efficient traitor tracing. Our schemes enjoy …
Candidate obfuscation via oblivious LWE sampling
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our
scheme is inspired by lattices and learning-with-errors (LWE) techniques, but we are unable …
scheme is inspired by lattices and learning-with-errors (LWE) techniques, but we are unable …
Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
H Wee - Annual International Conference on the Theory and …, 2022 - Springer
We present a new, simple candidate broadcast encryption scheme for N users with
parameter size poly (log N). We prove security of our scheme under a non-standard variant …
parameter size poly (log N). We prove security of our scheme under a non-standard variant …
Witness encryption and null-IO from evasive LWE
Witness encryption (WE) allows us to use an arbitrary NP statement x as a public key to
encrypt a message, and the witness w serves as a decryption key. Security ensures that …
encrypt a message, and the witness w serves as a decryption key. Security ensures that …
Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation
Cloud storage services allow users to outsource their data to cloud servers to save local
data storage costs. However, unlike using local storage devices, users do not physically …
data storage costs. However, unlike using local storage devices, users do not physically …
Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
H Lin - Annual International Cryptology Conference, 2017 - Springer
Two recent works [Lin, EUROCRYPT 2016, Lin and Vaikuntanathan, FOCS 2016] showed
how to construct Indistinguishability Obfuscation (IO) from constant degree multilinear maps …
how to construct Indistinguishability Obfuscation (IO) from constant degree multilinear maps …
Factoring and pairings are not necessary for io: Circular-secure lwe suffices
We construct indistinguishability obfuscation (iO) solely under circular-security properties of
encryption schemes based on the Learning with Errors (LWE) problem. Circular-security …
encryption schemes based on the Learning with Errors (LWE) problem. Circular-security …
Annihilation attacks for multilinear maps: Cryptanalysis of indistinguishability obfuscation over GGH13
In this work, we present a new class of polynomial-time attacks on the original multilinear
maps of Garg, Gentry, and Halevi (2013). Previous polynomial-time attacks on GGH13 were …
maps of Garg, Gentry, and Halevi (2013). Previous polynomial-time attacks on GGH13 were …
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
We consider the question of finding the lowest degree L for which L-linear maps suffice to
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …