Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
|
2020 |
Dowling, Benjamin |
Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange
|
2020 |
Guo, Siyao |
Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography
|
2020 |
Baum, Carsten |
Witness Maps and Applications
|
2020 |
Chakraborty, Suvradip |
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
|
2020 |
Agrikola, Thomas |
Public-Key Puncturable Encryption: Modular and Compact Constructions
|
2020 |
Sun, Shi-Feng |
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
|
2020 |
Derler, David |
Updateable Inner Product Argument with Logarithmic Verifier and Applications
|
2020 |
Daza, Vanesa |
Almost Tight Security in Lattices with Polynomial Moduli — PRF, IBE, All-but-many LTF, and More
|
2020 |
Lai, Qiqi |
Fast, Compact, and Expressive Attribute-Based Encryption
|
2020 |
Tomida, Junichi |
Master-Key KDM-Secure IBE from Pairings
|
2020 |
Garg, Sanjam |
Verifiable Inner Product Encryption Scheme
|
2020 |
Soroush, Najmeh |
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
|
2020 |
Langrehr, Roman |
Toward RSA-OAEP Without Random Oracles
|
2020 |
Cao, Nairen |
Constraining and Watermarking PRFs from Milder Assumptions
|
2020 |
Peikert, Chris |
On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness
|
2020 |
Abe, Masayuki |
On QA-NIZK in the BPK Model
|
2020 |
Abdolmaleki, Behzad |
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography
|
2020 |
Genise, Nicholas |
Adaptive Simulation Security for Inner Product Functional Encryption
|
2020 |
Agrawal, Shweta |
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
|
2020 |
Gay, Romain |