Threshold Garbled Circuits and Ad Hoc Secure Computation
|
2021 |
Ciampi, Michele |
Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits
|
2021 |
Ben-Efraim, Aner |
Black-Box Non-interactive Non-malleable Commitments
|
2021 |
Garg, Rachit |
Towards Accountability in CRS Generation
|
2021 |
Ananth, Prabhanjan |
Dynamic Ad Hoc Clock Synchronization
|
2021 |
Badertscher, Christian |
On the Power of Multiple Anonymous Messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy
|
2021 |
Ghazi, Badih |
Non-Interactive Anonymous Router
|
2021 |
Shi, Elaine |
Abuse Resistant Law Enforcement Access Systems
|
2021 |
Green, Matthew |
Candidate Obfuscation via Oblivious LWE Sampling
|
2021 |
Wee, Hoeteck |
Robust Property-Preserving Hash Functions for Hamming Distance and More
|
2021 |
Fleischhacker, Nils |
Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme
|
2021 |
Libert, Benoit |
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification
|
2021 |
Gay, Romain |
Public-Coin Statistical Zero-Knowledge Batch Verification Against, Malicious Verifiers
|
2021 |
Kaslasi, Inbar |
Alibi: A Flaw in Cuckoo-Hashing Based Hierarchical ORAM Schemes and a Solution
|
2021 |
Falk, Brett Hemenway |
LogStack: Stacked Garbling with O (b log b) Computation
|
2021 |
Heath, David |
Non-interactive Distributional Indistinguishability (NIDI) and Non-malleable Commitments
|
2021 |
Khurana, Dakshita |
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
|
2021 |
Couteau, Geoffroy |
Structured Encryption and Dynamic Leakage Suppression
|
2021 |
George, Marilyn |
TARDIS: A Foundation of Time-Lock Puzzles in U
|
2021 |
Baum, Carsten |