Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A blockchain framework for patient-centered health records and exchange (HealthChain): evaluation and proof-of-concept study
Background Blockchain has the potential to disrupt the current modes of patient data access,
accumulation, contribution, exchange, and control. Using interoperability standards, smart …
accumulation, contribution, exchange, and control. Using interoperability standards, smart …
Recursive proof composition without a trusted setup
S Bowe, J Grigg, D Hopwood - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Non-interactive arguments of knowledge are powerful cryptographic tools that can be used
to demonstrate the faithful execution of arbitrary computations with publicly verifiable proofs …
to demonstrate the faithful execution of arbitrary computations with publicly verifiable proofs …
[PDF][PDF] Zcash protocol specification
D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - caladex.io
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …
with security fixes and improvements to performance and functionality. It bridges the existing …
Zexe: Enabling decentralized private computation
Ledger-based systems that support rich applications often suffer from two limitations. First,
validating a transaction requires re-executing the state transition that it attests to. Second …
validating a transaction requires re-executing the state transition that it attests to. Second …
Succinct {Non-Interactive} zero knowledge for a von neumann architecture
We build a system that provides succinct non-interactive zero-knowledge proofs (zk-
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …
Updating key size estimations for pairings
R Barbulescu, S Duquesne - Journal of cryptology, 2019 - Springer
Recent progress on NFS imposed a new estimation of the security of pairings. In this work
we study the best attacks against some of the most popular pairings and propose new key …
we study the best attacks against some of the most popular pairings and propose new key …
Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
Short signatures from the Weil pairing
We introduce a short signature scheme based on the Computational Diffie-Hellman
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …
assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size …
Scalable zero knowledge via cycles of elliptic curves
Non-interactive zero-knowledge proofs of knowledge for general NP statements are a
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …
powerful cryptographic primitive, both in theory and in practical applications. Recently, much …
Certificateless public key cryptography
SS Al-Riyami, KG Paterson - International conference on the theory and …, 2003 - Springer
This paper introduces and makes concrete the concept of certificateless public key
cryptography (CL-PKC), a model for the use of public key cryptography which avoids the …
cryptography (CL-PKC), a model for the use of public key cryptography which avoids the …