Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of oblivious transfer protocol
Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide
range of applications such as secure multi-party computation, private information retrieval …
range of applications such as secure multi-party computation, private information retrieval …
A survey on cryptographic techniques for protecting big data security: present and forthcoming
S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …
and provide novel ways of exploring the world. As they significantly create economic and …
Compact, efficient and UC-secure isogeny-based oblivious transfer
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block
for almost all secure multiparty functionalities. The strongest security notion against …
for almost all secure multiparty functionalities. The strongest security notion against …
The hardness of LPN over any integer ring and field for PCG applications
Learning parity with noise (LPN) has been widely studied and used in cryptography. It was
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …
Non-interactive zero-knowledge from LPN and MQ
We give the first construction of non-interactive zero-knowledge (NIZK) arguments from post-
quantum assumptions other than Learning with Errors. In particular, we achieve NIZK under …
quantum assumptions other than Learning with Errors. In particular, we achieve NIZK under …
Lossy cryptography from code-based assumptions
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …
primitives with lossy or homomorphic properties built from various assumptions such as …
Statistical zaps and new oblivious transfer protocols
We study the problem of achieving statistical privacy in interactive proof systems and
oblivious transfer–two of the most well studied two-party protocols–when limited rounds of …
oblivious transfer–two of the most well studied two-party protocols–when limited rounds of …
Obfuscation of pseudo-deterministic quantum circuits
We show how to obfuscate pseudo-deterministic quantum circuits, assuming the quantum
hardness of learning with errors (QLWE) and post-quantum virtual black-box (VBB) …
hardness of learning with errors (QLWE) and post-quantum virtual black-box (VBB) …
Concretely efficient secure multi-party computation protocols: survey and more
D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …
their private inputs, and reveals nothing but the output of the function. In the last decade …
Composable oblivious pseudo-random functions via garbled circuits
S Faller, A Ottenhues, J Ottenhues - International Conference on …, 2023 - Springer
Abstract Oblivious Pseudo-Random Functions (OPRFs) are a central tool for building
modern protocols for authentication and distributed computation. For example, OPRFs …
modern protocols for authentication and distributed computation. For example, OPRFs …