×

Found 42 Documents (Results 1–42)

Black-box separations for non-interactive classical commitments in a quantum world. (English) Zbl 07789159

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14004, 144-172 (2023).
MSC:  81P94 94A60
PDFBibTeX XMLCite
Full Text: DOI

Fine-grained non-interactive key-exchange: constructions and lower bounds. (English) Zbl 07789156

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14004, 55-85 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lower bounds for the number of decryption updates in registration-based encryption. (English) Zbl 1519.94171

Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13747, 559-587 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the impossibility of key agreements from quantum random oracles. (English) Zbl 1527.81037

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 165-194 (2022).
PDFBibTeX XMLCite
Full Text: DOI

Polynomial-time targeted attacks on coin tossing for any number of corruptions. (English) Zbl 1511.94097

Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 718-750 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computational concentration of measure: optimal bounds, reductions, and more. (English) Zbl 07304044

Chawla, Shuchi (ed.), Proceedings of the 31st annual ACM-SIAM symposium on discrete algorithms, SODA 2020, Salt Lake City, UT, USA, January 5–8, 2020. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM); New York, NY: Association for Computing Machinery (ACM). 345-363 (2020).
MSC:  68Wxx
PDFBibTeX XMLCite
Full Text: DOI arXiv

Registration-based encryption from standard assumptions. (English) Zbl 1453.94080

Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 63-93 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the round complexity of OT extension. (English) Zbl 1457.94134

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10993, 545-574 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Limits on the power of garbling techniques for public-key encryption. (English) Zbl 1457.94133

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10993, 335-364 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Learning under \(p\)-tampering attacks. (English) Zbl 1405.68297

Janoos, Firdaus (ed.) et al., Algorithmic learning theory 2018. Proceedings of the 29th international conference (ALT 2018), Lanzarote, Spain, April 7–9, 2018. [s.l.]: Proceedings of Machine Learning Research PMLR. Proceedings of Machine Learning Research (PMLR) 83, 572-596 (2018).
MSC:  68T05 68P25 68W20
PDFBibTeX XMLCite
Full Text: arXiv Link

Registration-based encryption: removing private-key generator from IBE. (English) Zbl 1443.94057

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 689-718 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Blockwise \(p\)-tampering attacks on cryptographic primitives, extractors, and learners. (English) Zbl 1406.94074

Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-70502-6/pbk; 978-3-319-70503-3/ebook). Lecture Notes in Computer Science 10678, 245-279 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lower bounds on obfuscation from all-or-nothing encryption primitives. (English) Zbl 1407.94109

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10401, 661-695 (2017).
MSC:  94A60 68Q15
PDFBibTeX XMLCite
Full Text: DOI

On the power of hierarchical identity-based encryption. (English) Zbl 1369.94556

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49895-8/pbk; 978-3-662-49896-5/ebook). Lecture Notes in Computer Science 9666, 243-272 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lower bounds on assumptions behind indistinguishability obfuscation. (English) Zbl 1388.94072

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 49-66 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the impossibility of virtual black-box obfuscation in idealized models. (English) Zbl 1388.94071

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 18-48 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimizing static and adaptive probing schedules for rapid event detection. (English) Zbl 1473.68188

Lu, Zaixin (ed.) et al., Combinatorial optimization and applications. 9th international conference, COCOA 2015, Houston, TX, USA, December 18–20, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9486, 377-391 (2015).
MSC:  68T20 68W20 68W25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Limits of random oracles in secure computation (extended abstract). (English) Zbl 1364.68206

Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 23-33 (2014).
MSC:  68Q05 68Q10 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the impossibility of cryptography with tamperable randomness. (English) Zbl 1345.94033

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 462-479 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the power of public-key encryption in secure computation. (English) Zbl 1326.94112

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 240-264 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Can optimally-fair coin tossing be based on one-way functions? (English) Zbl 1323.94108

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 217-239 (2014).
MSC:  94A60 68Q15
PDFBibTeX XMLCite
Full Text: DOI

On the power of nonuniformity in proofs of security. (English) Zbl 1361.94038

Proceedings of the 4th conference on innovations in theoretical computer science, ITCS’13, Berkeley, CA, USA, January 9–12, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1859-4). 389-400 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Publicly verifiable proofs of sequential work. (English) Zbl 1362.94041

Proceedings of the 4th conference on innovations in theoretical computer science, ITCS’13, Berkeley, CA, USA, January 9–12, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1859-4). 373-388 (2013).
MSC:  94A60 68Q05 68Q10
PDFBibTeX XMLCite
Full Text: DOI Link

Languages with efficient zero-knowledge PCPs are in SZK. (English) Zbl 1315.94089

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 297-314 (2013).
MSC:  94A60 68Q15
PDFBibTeX XMLCite
Full Text: DOI

The curious case of non-interactive commitments – on the power of black-box vs. non-black-box use of primitives. (English) Zbl 1296.94131

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 701-718 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On black-box reductions between predicate encryption schemes. (English) Zbl 1303.94081

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 440-457 (2012).
MSC:  94A60 68P25 68Q15
PDFBibTeX XMLCite
Full Text: DOI

On efficient zero-knowledge PCPs. (English) Zbl 1304.68056

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 151-168 (2012).
MSC:  68Q15 94A60
PDFBibTeX XMLCite
Full Text: DOI

Time-lock puzzles in the random oracle model. (English) Zbl 1287.94083

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 39-50 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the black-box complexity of optimally-fair coin tossing. (English) Zbl 1295.94044

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 450-467 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Interactive locking, zero-knowledge PCPs, and unconditional cryptography. (English) Zbl 1280.94063

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 173-190 (2010).
MSC:  94A60 68T15
PDFBibTeX XMLCite
Full Text: DOI

Merkle puzzles are optimal – an \(O(n^2)\)-query attack on any key exchange from a random oracle. (English) Zbl 1252.94046

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 374-390 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software