Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Smart meter data privacy: A survey
Automated and smart meters are devices that are able to monitor the energy consumption of
electricity consumers in near real-time. They are considered key technological enablers of …
electricity consumers in near real-time. They are considered key technological enablers of …
A comprehensive survey on secure outsourced computation and its applications
With the ever-increasing requirement of storage and computation resources, it is unrealistic
for local devices (with limited sources) to implement large-scale data processing. Therefore …
for local devices (with limited sources) to implement large-scale data processing. Therefore …
Transparent polynomial delegation and its applications to zero knowledge proof
We present a new succinct zero knowledge argument scheme for layered arithmetic circuits
without trusted setup. The prover time is O (C+ nlogn) and the proof size is O (D logC+ log 2 …
without trusted setup. The prover time is O (C+ nlogn) and the proof size is O (D logC+ log 2 …
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
It is common nowadays for data owners to outsource their data to the cloud. Since the cloud
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …
cannot be fully trusted, the outsourced data should be encrypted. This however brings a …
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
The existence of succinct non-interactive arguments for NP (ie, non-interactive
computationally-sound proofs where the verifier's work is essentially independent of the …
computationally-sound proofs where the verifier's work is essentially independent of the …
vSQL: Verifying arbitrary SQL queries over dynamic outsourced databases
Cloud database systems such as Amazon RDS or Google Cloud SQLenable the
outsourcing of a large database to a server who then responds to SQL queries. A natural …
outsourcing of a large database to a server who then responds to SQL queries. A natural …
Succinct non-interactive arguments via linear interactive proofs
Succinct non-interactive arguments (SNARGs) enable verifying NP statements with lower
complexity than required for classical NP verification. Traditionally, the focus has been on …
complexity than required for classical NP verification. Traditionally, the focus has been on …
Delegatable pseudorandom functions and applications
We put forth the problem of delegating the evaluation of a pseudorandom function (PRF) to
an untrusted proxy and introduce a novel cryptographic primitive called delegatable …
an untrusted proxy and introduce a novel cryptographic primitive called delegatable …
Verifiable fully homomorphic encryption
Fully Homomorphic Encryption (FHE) is seeing increasing real-world deployment to protect
data in use by allowing computation over encrypted data. However, the same malleability …
data in use by allowing computation over encrypted data. However, the same malleability …
Vector commitments and their applications
We put forward the study of a new primitive that we call Vector Commitment (VC, for short).
Informally, VCs allow to commit to an ordered sequence of q values (m1,..., mq) in such a …
Informally, VCs allow to commit to an ordered sequence of q values (m1,..., mq) in such a …