Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adaptively secure bls threshold signatures from ddh and co-cdh
Threshold signatures are one of the most important cryptographic primitives in distributed
systems. A popular choice of threshold signature scheme is the BLS threshold signature …
systems. A popular choice of threshold signature scheme is the BLS threshold signature …
Twinkle: Threshold signatures from ddh with full adaptive security
Sparkle is the first threshold signature scheme in the pairing-free discrete logarithm setting
(Crites, Komlo, Maller, Crypto 2023) to be proven secure under adaptive corruptions …
(Crites, Komlo, Maller, Crypto 2023) to be proven secure under adaptive corruptions …
Monotone-policy aggregate signatures
The notion of aggregate signatures allows for combining signatures from different parties
into a short certificate that attests that all parties signed a message. In this work, we lift this …
into a short certificate that attests that all parties signed a message. In this work, we lift this …
Distributed Randomness using Weighted VUFs
Shared randomness in blockchain can expand its support for randomized applications and
can also help strengthen its security. Many existing blockchains rely on external …
can also help strengthen its security. Many existing blockchains rely on external …
How to prove statements obliviously?
Cryptographic applications often require proving statements about hidden secrets satisfying
certain circuit relations. Moreover, these proofs must often be generated obliviously, ie …
certain circuit relations. Moreover, these proofs must often be generated obliviously, ie …
BFT-DSN: a byzantine fault tolerant decentralized storage network
With the rapid development of blockchain and its applications, the amount of data stored on
decentralized storage networks (DSNs) has grown exponentially. DSNs bring together …
decentralized storage networks (DSNs) has grown exponentially. DSNs bring together …
Vector commitments with proofs of smallness: Short range proofs and more
Vector commitment schemes are compressing commitments to vectors that make it possible
to succinctly open a commitment for individual vector positions without revealing anything …
to succinctly open a commitment for individual vector positions without revealing anything …
GRandLine: Adaptively Secure DKG and Randomness Beacon with (Almost) Quadratic Communication Complexity.
A randomness beacon is a source of continuous and publicly verifiable randomness which
is of crucial importance for many applications. Existing works on distributed randomness …
is of crucial importance for many applications. Existing works on distributed randomness …
Accountable and secure threshold EdDSA signature and its applications
Threshold signatures as a method to realize multi-party cooperation and trust distribution in
blockchain have been widely studied in recent years. However, among these researches …
blockchain have been widely studied in recent years. However, among these researches …
Swiper: a new paradigm for efficient weighted distributed protocols
The majority of fault-tolerant distributed algorithms are designed assuming a nominal
corruption model, in which at most a fraction fn of parties can be corrupted by the adversary …
corruption model, in which at most a fraction fn of parties can be corrupted by the adversary …