Login / Signup
Public Key Cryptography (2)
2016
2019
2024
2016
2024
Keyphrases
Publications
2024
Marco Baldi
,
Sebastian Bitzer
,
Alessio Pavoni
,
Paolo Santini
,
Antonia Wachter-Zeh
,
Violetta Weger
Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem.
Public Key Cryptography (2)
(2024)
Hongxiao Wang
,
Siu-Ming Yiu
,
Yanmin Zhao
,
Zoe Lin Jiang
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice.
Public Key Cryptography (2)
(2024)
Foteini Baldimtsi
,
Ioanna Karantaidou
,
Srinivasan Raghuraman
Oblivious Accumulators.
Public Key Cryptography (2)
(2024)
Benoît Libert
Vector Commitments with Proofs of Smallness: Short Range Proofs and More.
Public Key Cryptography (2)
(2024)
Moumita Dutta
,
Chaya Ganesh
,
Neha Jawalkar
Succinct Verification of Compressed Sigma Protocols in the Updatable SRS Setting.
Public Key Cryptography (2)
(2024)
Yuncong Zhang
,
Shifeng Sun
,
Dawu Gu
Efficient KZG-Based Univariate Sum-Check and Lookup Argument.
Public Key Cryptography (2)
(2024)
Zhedong Wang
,
Qiqi Lai
,
Feng-Hao Liu
Ring/Module Learning with Errors Under Linear Leakage - Hardness and Applications.
Public Key Cryptography (2)
(2024)
Claudia Bartoli
,
Ignacio Cascudo
On Sigma-Protocols and (Packed) Black-Box Secret Sharing Schemes.
Public Key Cryptography (2)
(2024)
Daniel Escudero
,
Ivan Tjuawinata
,
Chaoping Xing
On Information-Theoretic Secure Multiparty Computation with Local Repairability.
Public Key Cryptography (2)
(2024)
Benoît Libert
Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk.
Public Key Cryptography (2)
(2024)
Matteo Campanelli
,
Dario Fiore
,
Hamidreza Khoshakhlagh
Witness Encryption for Succinct Functional Commitments and Applications.
Public Key Cryptography (2)
(2024)
Matteo Campanelli
,
Antonio Faonio
,
Dario Fiore
,
Tianyu Li
,
Helger Lipmaa
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees.
Public Key Cryptography (2)
(2024)
Nidhish Bhimrajka
,
Ashish Choudhury
,
Supreeth Varadarajan
Network-Agnostic Multi-party Computation Revisited (Extended Abstract).
Public Key Cryptography (2)
(2024)
Xindong Liu
,
Li-Ping Wang
Short Code-Based One-out-of-Many Proofs and Applications.
Public Key Cryptography (2)
(2024)
volume 14602, 2024
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part II
Public Key Cryptography (2)
14602 (2024)
2023
Xiangyu Liu
,
Shengli Liu
,
Shuai Han
,
Dawu Gu
Fine-Grained Verifier NIZK and Its Applications.
Public Key Cryptography (2)
(2023)
Yao Jiang Galteland
,
Jiaxin Pan
Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption.
Public Key Cryptography (2)
(2023)
Antonio Faonio
,
Dennis Hofheinz
,
Luigi Russo
Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption.
Public Key Cryptography (2)
(2023)
Pierre-Alain Fouque
,
Adela Georgescu
,
Chen Qian
,
Adeline Roux-Langlois
,
Weiqiang Wen
A Generic Transform from Multi-round Interactive Proof to NIZK.
Public Key Cryptography (2)
(2023)
Giuseppe Ateniese
,
Long Chen
,
Danilo Francati
,
Dimitrios Papadopoulos
,
Qiang Tang
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Public Key Cryptography (2)
(2023)
Arasu Arun
,
Chaya Ganesh
,
Satya V. Lokam
,
Tushar Mopuri
,
Sriram Sridhar
Dew: A Transparent Constant-Sized Polynomial Commitment Scheme.
Public Key Cryptography (2)
(2023)
Carlo Brunetta
,
Hans Heum
,
Martijn Stam
Multi-instance Secure Public-Key Encryption.
Public Key Cryptography (2)
(2023)
Geng Wang
,
Shi-Feng Sun
,
Zhedong Wang
,
Dawu Gu
Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications.
Public Key Cryptography (2)
(2023)
Thomas Attema
,
Pedro Capitão
,
Lisa Kohl
On Homomorphic Secret Sharing from Polynomial-Modulus LWE.
Public Key Cryptography (2)
(2023)
Miguel Ambrona
,
Romain Gay
Multi-authority ABE for Non-monotonic Access Structures.
Public Key Cryptography (2)
(2023)
Satrajit Ghosh
,
Mark Simkin
Threshold Private Set Intersection with Better Communication Complexity.
Public Key Cryptography (2)
(2023)
Markus Krausz
,
Georg Land
,
Jan Richter-Brockmann
,
Tim Güneysu
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling.
Public Key Cryptography (2)
(2023)
Suvradip Chakraborty
,
Manoj Prabhakaran
,
Daniel Wichs
A Map of Witness Maps: New Definitions and Connections.
Public Key Cryptography (2)
(2023)
Dimitris Kolonelos
,
Mary Maller
,
Mikhail Volkhov
Zero-Knowledge Arguments for Subverted RSA Groups.
Public Key Cryptography (2)
(2023)
Riddhi Ghosal
,
Amit Sahai
,
Brent Waters
Non-Interactive Publicly-Verifiable Delegation of Committed Programs.
Public Key Cryptography (2)
(2023)
Peihan Miao
,
Sikhar Patranabis
,
Gaven J. Watson
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH.
Public Key Cryptography (2)
(2023)
Geoffroy Couteau
,
Clément Ducros
Pseudorandom Correlation Functions from Variable-Density LPN, Revisited.
Public Key Cryptography (2)
(2023)
Nico Döttling
,
Phillip Gajland
,
Giulio Malavolta
Laconic Function Evaluation for Turing Machines.
Public Key Cryptography (2)
(2023)
Rishabh Bhadauria
,
Carmit Hazay
,
Muthuramakrishnan Venkitasubramaniam
,
Wenxuan Wu
,
Yupeng Zhang
Private Polynomial Commitments and Applications to MPC.
Public Key Cryptography (2)
(2023)
Sanjam Garg
,
Mohammad Hajiabadi
,
Abhishek Jain
,
Zhengzhong Jin
,
Omkant Pandey
,
Sina Shiehian
Credibility in Private Set Membership.
Public Key Cryptography (2)
(2023)
KangHoon Lee
,
Ji Won Yoon
Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption.
Public Key Cryptography (2)
(2023)
Matteo Campanelli
,
Danilo Francati
,
Claudio Orlandi
Structure-Preserving Compilers from New Notions of Obfuscations.
Public Key Cryptography (2)
(2023)
Dung Bui
,
Geoffroy Couteau
Improved Private Set Intersection for Sets with Small Entries.
Public Key Cryptography (2)
(2023)
volume 13941, 2023
Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II
Public Key Cryptography (2)
13941 (2023)
2022
Jacqueline Brendel
,
Rune Fiedler
,
Felix Günther
,
Christian Janson
,
Douglas Stebila
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
Public Key Cryptography (2)
(2022)
Jose Maria Bermudo Mera
,
Angshuman Karmakar
,
Tilen Marc
,
Azam Soleimanian
Efficient Lattice-Based Inner-Product Functional Encryption.
Public Key Cryptography (2)
(2022)
Sebastian Faust
,
Carmit Hazay
,
David Kretzler
,
Benjamin Schlosser
Financially Backed Covert Security.
Public Key Cryptography (2)
(2022)
Julia Kastner
,
Julian Loss
,
Jiayu Xu
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
Public Key Cryptography (2)
(2022)
Kamil Kluczniak
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.
Public Key Cryptography (2)
(2022)
Ryo Nishimaki
The Direction of Updatable Encryption Does Matter.
Public Key Cryptography (2)
(2022)
Jiaxin Pan
,
Benedikt Wagner
Lattice-Based Signatures with Tight Adaptive Corruptions and More.
Public Key Cryptography (2)
(2022)
Fuyuki Kitagawa
,
Ryo Nishimaki
KDM Security for the Fujisaki-Okamoto Transformations in the QROM.
Public Key Cryptography (2)
(2022)
Abida Haque
,
Stephan Krenn
,
Daniel Slamanig
,
Christoph Striecks
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.
Public Key Cryptography (2)
(2022)
Qiqi Lai
,
Feng-Hao Liu
,
Zhedong Wang
Leakage-Resilient IBE/ ABE with Optimal Leakage Rates from Lattices.
Public Key Cryptography (2)
(2022)
volume 13178, 2022
Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II
Public Key Cryptography (2)
13178 (2022)