Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An algebraic framework for Diffie–Hellman assumptions
We put forward a new algebraic framework to generalize and analyze Diffie–Hellman like
decisional assumptions which allows us to argue about security and applications by …
decisional assumptions which allows us to argue about security and applications by …
Shorter quasi-adaptive NIZK proofs for linear subspaces
CS Jutla, A Roy - Journal of Cryptology, 2017 - Springer
We define a novel notion of quasi-adaptive non-interactive zero-knowledge (NIZK) proofs for
probability distributions on parameterized languages. It is quasi-adaptive in the sense that …
probability distributions on parameterized languages. It is quasi-adaptive in the sense that …
Quasi-adaptive NIZK for linear subspaces revisited
Non-interactive zero-knowledge (NIZK) proofs for algebraic relations in a group, such as the
Groth-Sahai proofs, are an extremely powerful tool in pairing-based cryptography. A series …
Groth-Sahai proofs, are an extremely powerful tool in pairing-based cryptography. A series …
Linearly homomorphic structure-preserving signatures and their applications
Abstract Structure-preserving signatures (SPS) are signature schemes where messages,
signatures and public keys all consist of elements of a group over which a bilinear map is …
signatures and public keys all consist of elements of a group over which a bilinear map is …
SPHF-friendly non-interactive commitments
In 2009, Abdalla et al. proposed a reasonably practical password-authenticated key
exchange (PAKE) secure against adaptive adversaries in the universal composability (UC) …
exchange (PAKE) secure against adaptive adversaries in the universal composability (UC) …
Compactly hiding linear spans: Tightly secure constant-size simulation-sound QA-NIZK proofs and applications
Quasi-adaptive non-interactive zero-knowledge (QA-NIZK) proofs is a recent paradigm,
suggested by Jutla and Roy (Asiacrypt'13), which is motivated by the Groth-Sahai seminal …
suggested by Jutla and Roy (Asiacrypt'13), which is motivated by the Groth-Sahai seminal …
A stronger secure ciphertext fingerprint-based commitment scheme for robuster verifiable OD-CP-ABE in IMCC
Outsourced decryption attribute-based encryption (OD-ABE) is emerging as a promising
cryptographic tool to provide efficient fine-grained access control for data accessing and …
cryptographic tool to provide efficient fine-grained access control for data accessing and …
Improved (almost) tightly-secure simulation-sound QA-NIZK with applications
M Abe, CS Jutla, M Ohkubo, A Roy - … on the Theory and Application of …, 2018 - Springer
We construct the first (almost) tightly-secure unbounded-simulation-sound quasi-adaptive
non-interactive zero-knowledge arguments (USS-QA-NIZK) for linear-subspace languages …
non-interactive zero-knowledge arguments (USS-QA-NIZK) for linear-subspace languages …
On QA-NIZK in the BPK model
Recently, Bellare et al. defined subversion-resistance (security in the case the CRS creator
may be malicious) for NIZK. In particular, a Sub-ZK NIZK is zero-knowledge, even in the …
may be malicious) for NIZK. In particular, a Sub-ZK NIZK is zero-knowledge, even in the …
Shorter QA-NIZK and SPS with tighter security
Quasi-adaptive non-interactive zero-knowledge proof (QA-NIZK) systems and structure-
preserving signature (SPS) schemes are two powerful tools for constructing practical pairing …
preserving signature (SPS) schemes are two powerful tools for constructing practical pairing …