Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
Blockchain security: A survey of techniques and research directions
Blockchain, an emerging paradigm of secure and shareable computing, is a systematic
integration of 1) chain structure for data verification and storage, 2) distributed consensus …
integration of 1) chain structure for data verification and storage, 2) distributed consensus …
Privacy-preserving multi-keyword ranked search over encrypted cloud data
With the advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to the commercial public cloud for great flexibility …
data management systems from local sites to the commercial public cloud for great flexibility …
Functional encryption: Definitions and challenges
We initiate the formal study of functional encryption by giving precise definitions of the
concept and its security. Roughly speaking, functional encryption supports restricted secret …
concept and its security. Roughly speaking, functional encryption supports restricted secret …
Decentralizing attribute-based encryption
Abstract We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our
system, any party can become an authority and there is no requirement for any global …
system, any party can become an authority and there is no requirement for any global …
Privacy and data protection by design-from policy to engineering
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …
There have been decades of debate on how those values-and legal obligations-can be …
A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
Bonsai trees, or how to delegate a lattice basis
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to
resolve some important open problems in the area. Applications of bonsai trees include an …
resolve some important open problems in the area. Applications of bonsai trees include an …
A hybrid solution for privacy preserving medical data sharing in the cloud environment
Storing and sharing of medical data in the cloud environment, where computing resources
including storage is provided by a third party service provider, raise serious concern of …
including storage is provided by a third party service provider, raise serious concern of …
Predicate encryption supporting disjunctions, polynomial equations, and inner products
Predicate encryption is a new paradigm generalizing, among other things, identity-based
encryption. In a predicate encryption scheme, secret keys correspond to predicates and …
encryption. In a predicate encryption scheme, secret keys correspond to predicates and …