Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Position-based quantum cryptography: Impossibility and constructions
In this work, we study position-based cryptography in the quantum setting. The aim is to use
the geographical position of a party as its only credential. On the negative side, we show that …
the geographical position of a party as its only credential. On the negative side, we show that …
Two source extractors for asymptotically optimal entropy, and (many) more
X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between
several different pseudorandom objects and applications, including seeded or seedless non …
several different pseudorandom objects and applications, including seeded or seedless non …
Robust fuzzy extractors and authenticated key agreement from close secrets
Consider two parties holding correlated random variables W and W′, respectively, that are
within distance t of each other in some metric space. These parties wish to agree on a …
within distance t of each other in some metric space. These parties wish to agree on a …
Improved non-malleable extractors, non-malleable codes and independent source extractors
X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
Computational fuzzy extractors
Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined
information-theoretically, with gaps between known negative results, existential …
information-theoretically, with gaps between known negative results, existential …
Non-malleable extractors and codes, with their many tampered extensions
Randomness extractors and error correcting codes are fundamental objects in computer
science. Recently, there have been several natural generalizations of these objects, in the …
science. Recently, there have been several natural generalizations of these objects, in the …
Non-malleable extractors and non-malleable codes: Partially optimal constructions
X Li - arxiv preprint arxiv:1804.04005, 2018 - arxiv.org
The recent line of study on randomness extractors has been a great success, resulting in
exciting new techniques, new connections, and breakthroughs to long standing open …
exciting new techniques, new connections, and breakthroughs to long standing open …
Robust fuzzy extractors and authenticated key agreement from close secrets
Consider two parties holding samples from correlated distributions W and W^′,
respectively, where these samples are within distance t of each other in some metric space …
respectively, where these samples are within distance t of each other in some metric space …
A cryptographic treatment of the wiretap channel
The wiretap channel is a setting where one aims to provide information-theoretic privacy of
communicated data based solely on the assumption that the channel from sender to …
communicated data based solely on the assumption that the channel from sender to …
Privacy amplification and nonmalleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and
Wichs introduced the notion of a nonmalleable extractor. A nonmalleable extractor …
Wichs introduced the notion of a nonmalleable extractor. A nonmalleable extractor …