Sign in
Public Key Cryptography (2)
2016
2018
2021
2023
2016
2023
Keyphrases
Publications
2023
Xiangyu Liu
,
Shengli Liu
,
Shuai Han
,
Dawu Gu
Fine-Grained Verifier NIZK and Its Applications.
Public Key Cryptography (2)
(2023)
Arasu Arun
,
Chaya Ganesh
,
Satya V. Lokam
,
Tushar Mopuri
,
Sriram Sridhar
Dew: A Transparent Constant-Sized Polynomial Commitment Scheme.
Public Key Cryptography (2)
(2023)
Satrajit Ghosh
,
Mark Simkin
Threshold Private Set Intersection with Better Communication Complexity.
Public Key Cryptography (2)
(2023)
KangHoon Lee
,
Ji Won Yoon
Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption.
Public Key Cryptography (2)
(2023)
Miguel Ambrona
,
Romain Gay
Multi-authority ABE for Non-monotonic Access Structures.
Public Key Cryptography (2)
(2023)
Pierre-Alain Fouque
,
Adela Georgescu
,
Chen Qian
,
Adeline Roux-Langlois
,
Weiqiang Wen
A Generic Transform from Multi-round Interactive Proof to NIZK.
Public Key Cryptography (2)
(2023)
Markus Krausz
,
Georg Land
,
Jan Richter-Brockmann
,
Tim Güneysu
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling.
Public Key Cryptography (2)
(2023)
Riddhi Ghosal
,
Amit Sahai
,
Brent Waters
Non-Interactive Publicly-Verifiable Delegation of Committed Programs.
Public Key Cryptography (2)
(2023)
Suvradip Chakraborty
,
Manoj Prabhakaran
,
Daniel Wichs
A Map of Witness Maps: New Definitions and Connections.
Public Key Cryptography (2)
(2023)
Peihan Miao
,
Sikhar Patranabis
,
Gaven J. Watson
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH.
Public Key Cryptography (2)
(2023)
Rishabh Bhadauria
,
Carmit Hazay
,
Muthuramakrishnan Venkitasubramaniam
,
Wenxuan Wu
,
Yupeng Zhang
Private Polynomial Commitments and Applications to MPC.
Public Key Cryptography (2)
(2023)
Sanjam Garg
,
Mohammad Hajiabadi
,
Abhishek Jain
,
Zhengzhong Jin
,
Omkant Pandey
,
Sina Shiehian
Credibility in Private Set Membership.
Public Key Cryptography (2)
(2023)
Antonio Faonio
,
Dennis Hofheinz
,
Luigi Russo
Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption.
Public Key Cryptography (2)
(2023)
Nico Döttling
,
Phillip Gajland
,
Giulio Malavolta
Laconic Function Evaluation for Turing Machines.
Public Key Cryptography (2)
(2023)
Yao Jiang Galteland
,
Jiaxin Pan
Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption.
Public Key Cryptography (2)
(2023)
Geoffroy Couteau
,
Clément Ducros
Pseudorandom Correlation Functions from Variable-Density LPN, Revisited.
Public Key Cryptography (2)
(2023)
Thomas Attema
,
Pedro Capitão
,
Lisa Kohl
On Homomorphic Secret Sharing from Polynomial-Modulus LWE.
Public Key Cryptography (2)
(2023)
Giuseppe Ateniese
,
Long Chen
,
Danilo Francati
,
Dimitrios Papadopoulos
,
Qiang Tang
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting).
Public Key Cryptography (2)
(2023)
Geng Wang
,
Shi-Feng Sun
,
Zhedong Wang
,
Dawu Gu
Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications.
Public Key Cryptography (2)
(2023)
Carlo Brunetta
,
Hans Heum
,
Martijn Stam
Multi-instance Secure Public-Key Encryption.
Public Key Cryptography (2)
(2023)
Dimitris Kolonelos
,
Mary Maller
,
Mikhail Volkhov
Zero-Knowledge Arguments for Subverted RSA Groups.
Public Key Cryptography (2)
(2023)
Matteo Campanelli
,
Danilo Francati
,
Claudio Orlandi
Structure-Preserving Compilers from New Notions of Obfuscations.
Public Key Cryptography (2)
(2023)
Dung Bui
,
Geoffroy Couteau
Improved Private Set Intersection for Sets with Small Entries.
Public Key Cryptography (2)
(2023)
volume 13941, 2023
Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II
Public Key Cryptography (2)
13941 (2023)
2022
Jose Maria Bermudo Mera
,
Angshuman Karmakar
,
Tilen Marc
,
Azam Soleimanian
Efficient Lattice-Based Inner-Product Functional Encryption.
Public Key Cryptography (2)
(2022)
Jacqueline Brendel
,
Rune Fiedler
,
Felix Günther
,
Christian Janson
,
Douglas Stebila
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake.
Public Key Cryptography (2)
(2022)
Vadim Lyubashevsky
,
Ngoc Khanh Nguyen
,
Maxime Plançon
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures.
Public Key Cryptography (2)
(2022)
Sebastian Faust
,
Carmit Hazay
,
David Kretzler
,
Benjamin Schlosser
Financially Backed Covert Security.
Public Key Cryptography (2)
(2022)
Julia Kastner
,
Julian Loss
,
Jiayu Xu
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
Public Key Cryptography (2)
(2022)
Kamil Kluczniak
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption.
Public Key Cryptography (2)
(2022)
Ryo Nishimaki
The Direction of Updatable Encryption Does Matter.
Public Key Cryptography (2)
(2022)
Jiaxin Pan
,
Benedikt Wagner
Lattice-Based Signatures with Tight Adaptive Corruptions and More.
Public Key Cryptography (2)
(2022)
Abida Haque
,
Stephan Krenn
,
Daniel Slamanig
,
Christoph Striecks
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.
Public Key Cryptography (2)
(2022)
Qiqi Lai
,
Feng-Hao Liu
,
Zhedong Wang
Leakage-Resilient IBE/ ABE with Optimal Leakage Rates from Lattices.
Public Key Cryptography (2)
(2022)
Rohit Chatterjee
,
Kai-Min Chung
,
Xiao Liang
,
Giulio Malavolta
A Note on the Post-quantum Security of (Ring) Signatures.
Public Key Cryptography (2)
(2022)
Wasilij Beskorovajnov
,
Roland Gröll
,
Jörn Müller-Quade
,
Astrid Ottenhues
,
Rebecca Schwerdt
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels.
Public Key Cryptography (2)
(2022)
Fuyuki Kitagawa
,
Ryo Nishimaki
KDM Security for the Fujisaki-Okamoto Transformations in the QROM.
Public Key Cryptography (2)
(2022)
Ren Ishibashi
,
Kazuki Yoneyama
Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles.
Public Key Cryptography (2)
(2022)
Diego F. Aranha
,
Mathias Hall-Andersen
,
Anca Nitulescu
,
Elena Pagnin
,
Sophia Yakoubov
Count Me In! Extendability for Threshold Ring Signatures.
Public Key Cryptography (2)
(2022)
Ngoc Khanh Nguyen
,
Eftychios Theodorakis
,
Bogdan Warinschi
Lifting Standard Model Reductions to Common Setup Assumptions.
Public Key Cryptography (2)
(2022)
Erik Aronesty
,
David Cash
,
Yevgeniy Dodis
,
Daniel H. Gallancy
,
Christopher Higley
,
Harish Karthikeyan
,
Oren Tysor
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable.
Public Key Cryptography (2)
(2022)
volume 13178, 2022
Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II
Public Key Cryptography (2)
13178 (2022)
2021
Alessandra Scafuro
,
Luisa Siniscalchi
,
Ivan Visconti
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains.
Public Key Cryptography (2)
(2021)
Gayathri Garimella
,
Payman Mohassel
,
Mike Rosulek
,
Saeed Sadeghian
,
Jaspal Singh
Private Set Operations from Oblivious Switching.
Public Key Cryptography (2)
(2021)
Adam O'Neill
,
Mohammad Zaheri
On Selective-Opening Security of Deterministic Primitives.
Public Key Cryptography (2)
(2021)
David Niehues
Verifiable Random Functions with Optimal Tightness.
Public Key Cryptography (2)
(2021)
Khoa Nguyen
,
Reihaneh Safavi-Naini
,
Willy Susilo
,
Huaxiong Wang
,
Yanhong Xu
,
Neng Zeng
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation.
Public Key Cryptography (2)
(2021)
Marc Fischlin
,
Felix Rohrbach
Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge.
Public Key Cryptography (2)
(2021)
Koji Nuida
Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic.
Public Key Cryptography (2)
(2021)
volume 12711, 2021
Public-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part II
Public Key Cryptography (2)
12711 (2021)