×

Found 42 Documents (Results 1–42)

Improved straight-line extraction in the random oracle model with applications to signature aggregation. (English) Zbl 1519.94147

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 279-309 (2023).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols. (English) Zbl 1497.94081

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 241-271 (2022).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Multiparty generation of an RSA modulus. (English) Zbl 1504.94121

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 64-93 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Going beyond dual execution: MPC for functions with efficient verification. (English) Zbl 07436977

Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12111, 328-356 (2020).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Minimizing trust in hardware wallets with two factor signatures. (English) Zbl 1460.94056

Goldberg, Ian (ed.) et al., Financial cryptography and data security. 23rd international conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11598, 407-425 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure MPC with sublinear communication complexity. (English) Zbl 1483.68134

Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 30-60 (2019).
MSC:  68Q11 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-key searchable encryption, revisited. (English) Zbl 1385.94040

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 95-124 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Socially optimal mining pools. (English) Zbl 1405.91187

Devanur, Nikhil R. (ed.) et al., Web and internet economics. 13th international conference, WINE 2017, Bangalore, India, December 17–20, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-71923-8/pbk; 978-3-319-71924-5/ebook). Lecture Notes in Computer Science 10660, 205-218 (2017).
MSC:  91B16 68M11
PDFBibTeX XMLCite
Full Text: DOI arXiv

Analysis of the blockchain protocol in asynchronous networks. (English) Zbl 1415.94455

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10211, 643-673 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Lower bounds on assumptions behind indistinguishability obfuscation. (English) Zbl 1388.94072

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 49-66 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Impossibility of VBB obfuscation with ideal constant-degree graded encodings. (English) Zbl 1388.94075

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 3-17 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure computation from millionaire. (English) Zbl 1396.94100

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 736-757 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Black-box proof of knowledge of plaintext and multiparty computation with low communication overhead. (English) Zbl 1315.94096

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 397-417 (2013).
MSC:  94A60 68P25 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Blackbox construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness. (English) Zbl 1310.94162

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 149-165 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Computing on authenticated data. (English) Zbl 1292.94017

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 1-20 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Two-output secure computation with malicious adversaries. (English) Zbl 1282.68086

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 386-405 (2011).
MSC:  68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

Optimistic concurrent zero knowledge. (English) Zbl 1253.94066

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 359-376 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Bit encryption is complete. (English) Zbl 1292.94119

2009 IEEE 50th annual symposium on foundations of computer science – FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24–27, 2009. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-3850-1; 978-1-4244-5116-6/ebook). 607-616 (2009).
MSC:  94A60 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Collusion-free multiparty computation in the mediated model. (English) Zbl 1252.94042

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 524-540 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Purely rational secret sharing (extended abstract). (English) Zbl 1213.94159

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 54-71 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient protocols for set membership and range proofs. (English) Zbl 1206.94057

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 234-252 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collusion-free protocols in the mediated model. (English) Zbl 1183.68079

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 497-514 (2008).
MSC:  68M12 68M14 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient fork-linearizable access to untrusted shared memory. (English) Zbl 1283.68081

Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC ’07, Portland, OR, USA, August 12–15, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-616-5). 129-138 (2007).
MSC:  68M14 68M15 68W15
PDFBibTeX XMLCite
Full Text: DOI

Relations among notions of non-malleability for encryption. (English) Zbl 1153.94420

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 519-535 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Bounded CCA2-secure encryption. (English) Zbl 1153.94363

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 502-518 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simulatable adaptive oblivious transfer. (English) Zbl 1141.94344

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 573-590 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Securely obfuscating re-encryption. (English) Zbl 1129.94027

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 233-252 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Construction of a non-malleable encryption scheme from any semantically secure one. (English) Zbl 1161.94424

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 271-289 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collusion-free protocols. (English) Zbl 1192.94122

STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 543-552 (2005).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

Unconditional characterizations of non-interactive zero-knowledge. (English) Zbl 1145.94473

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 118-134 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Completely fair SFE and coalition-safe cheap talk. (English) Zbl 1321.94072

Proceedings of the 23rd annual ACM symposium on principles of distributed computing, PODC ’04, St. Johns, Newfoundland, Canada, July 25–28, 2004. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-802-4). 1-10 (2004).
MSC:  94A60 91A80 91B26
PDFBibTeX XMLCite
Full Text: DOI

Lower bounds for collusion-secure fingerprinting. (English) Zbl 1092.68605

Proceedings of the fourteenth annual ACM-SIAM symposium on discrete algorithms, Baltimore, MD, USA, January 12–14, 2003. New York, NY: Association for Computing Machinery; Philadelphia, PA: Society for Industrial and Applied Mathematics (ISBN 0-89871-538-5/pbk). 472-479 (2003).
MSC:  68P25
PDFBibTeX XMLCite

Approximating the smallest grammar: Kolmogorov complexity in natural models. (English) Zbl 1192.68397

Proceedings of the thirty-fourth annual ACM symposium on theory of computing (STOC 2002), Montreal, Quebec, Canada, May 19–21, 2002. New York, NY: ACM Press (ISBN 1-581-13495-9). 792-801, electronic only (2002).
MSC:  68Q42 68Q30
PDFBibTeX XMLCite
Full Text: DOI

Approximation algorithms for grammar-based compression. (English) Zbl 1093.68593

Proceedings of the thirteenth annual ACM-SIAM symposium on discrete algorithms, San Francisco, CA, USA, January 6–8, 2002. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM) (ISBN 0-89871-513-X/pbk). 205-212 (2002).
MSC:  68P30
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software