×

Found 37 Documents (Results 1–37)

Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation. (English) Zbl 1511.94169

Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 129-161 (2021).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multiparty reusable non-interactive secure computation from LWE. (English) Zbl 07440625

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 724-753 (2021).
MSC:  68P25 68Mxx 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the (in)security of ROS. (English) Zbl 1479.94294

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 33-53 (2021).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Can a public blockchain keep a secret? (English) Zbl 1479.94293

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12550, 260-290 (2020).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

From single-input to multi-client inner-product functional encryption. (English) Zbl 1456.94039

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 552-582 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Algebraic XOR-RKA-secure pseudorandom functions from post-zeroizing multilinear maps. (English) Zbl 1455.94098

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11922, 386-412 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Decentralizing inner-product functional encryption. (English) Zbl 1453.94056

Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 128-157 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Two-round adaptively secure multiparty computation from standard assumptions. (English) Zbl 1443.94046

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 175-205 (2018).
MSC:  94A60 68Q06
PDFBibTeX XMLCite
Full Text: DOI

On the local leakage resilience of linear secret sharing schemes. (English) Zbl 1444.94119

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 531-561 (2018).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

\(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits. (English) Zbl 1428.94060

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 500-532 (2018).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Hash proof systems over lattices revisited. (English) Zbl 1400.94119

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-76580-8/pbk; 978-3-319-76581-5/ebook). Lecture Notes in Computer Science 10770, 644-674 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms. (English) Zbl 1500.94018

Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 206-223 (2017).
MSC:  94A60 68Q10
PDFBibTeX XMLCite
Full Text: DOI

Optimization of bootstrapping in circuits. (English) Zbl 1409.68089

Klein, Philip N. (ed.), Proceedings of the 28th annual ACM-SIAM symposium on discrete algorithms, SODA 2017, Barcelona, Spain, January 16–19, 2017. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM); New York, NY: Association for Computing Machinery (ACM). 2423-2433 (2017).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Robust non-interactive multiparty computation against constant-size collusion. (English) Zbl 1407.94084

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10401, 391-419 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Private multiplication over finite fields. (English) Zbl 1418.94031

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10403, 397-426 (2017).
MSC:  94A60 68M07
PDFBibTeX XMLCite
Full Text: DOI

Removing erasures with explainable hash proof systems. (English) Zbl 1383.94012

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-54364-1/pbk; 978-3-662-54365-8/ebook). Lecture Notes in Computer Science 10174, 151-174 (2017).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

CCA-secure inner-product functional encryption from projective hash functions. (English) Zbl 1400.94120

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 36-66 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Randomness complexity of private circuits for multiplication. (English) Zbl 1371.94624

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49895-8/pbk; 978-3-662-49896-5/ebook). Lecture Notes in Computer Science 9666, 616-648 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Easing Coppersmith methods using analytic combinatorics: applications to public-key cryptography with weak pseudorandomness. (English) Zbl 1353.94034

Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49386-1/pbk; 978-3-662-49387-8/ebook). Lecture Notes in Computer Science 9615, 36-66 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient zero-knowledge proofs for commitments from learning with errors over rings. (English) Zbl 1499.68113

Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 305-325 (2015).
MSC:  68Q10 68Q11 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multilinear and aggregate pseudorandom functions: new constructions and improved security. (English) Zbl 1396.94057

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 103-120 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An algebraic framework for pseudorandom functions and applications to related-key security. (English) Zbl 1375.94094

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 388-409 (2015).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI Link

Implicit zero-knowledge arguments and applications to the malicious setting. (English) Zbl 1351.94026

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 107-129 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Disjunctions for hash proof systems: new constructions and applications. (English) Zbl 1326.94065

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 69-100 (2015).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Public-key encryption indistinguishable under plaintext-checkable attacks. (English) Zbl 1345.94027

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 332-352 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Better zero-knowledge proofs for lattice encryption and their application to group signatures. (English) Zbl 1306.94026

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 551-572 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Related-key security for pseudorandom functions beyond the linear barrier. (English) Zbl 1343.94035

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 77-94 (2014).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI

SPHF-friendly non-interactive commitments. (English) Zbl 1327.94023

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 214-234 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New techniques for SPHFs and efficient one-round PAKE protocols. (English) Zbl 1310.94125

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 449-475 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Tighter reductions for forward-secure signature schemes. (English) Zbl 1314.94098

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 292-311 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient UC-secure authenticated key-exchange for algebraic languages. (English) Zbl 1292.94168

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 272-291 (2013).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software