On the CCA Compatibility of Public-Key Infrastructure
|
2021 |
Khurana, Dakshita |
Masked Triples: Amortizing Multiplication Triples Across Conditionals
|
2021 |
Heath, David |
Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains
|
2021 |
Scafuro, Alessandra |
Flexible and Efficient Verifiable Computation on Encrypted Data
|
2021 |
Bois, Alexandre |
A Geometric Approach to Homomorphic Secret Sharing
|
2021 |
Ishai, Yuval |
On Selective-Opening Security of Deterministic Primitives
|
2021 |
O’Neill, Adam |
BETA: Biometric-Enabled Threshold Authentication
|
2021 |
Agrawal, Shashank |
Multi-party Threshold Private Set Intersection with Sublinear Communication
|
2021 |
Badrinarayanan, Saikrishna |
Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic
|
2021 |
Nuida, Koji |
Beyond Security and Efficiency: On-Demand Ratcheting with Security Awareness
|
2021 |
Caforio, Andrea |
Steel: Composable Hardware-Based Stateful and Randomised Functional Encryption
|
2021 |
Bhatotia, Pramod |
More Efficient Digital Signatures with Tight Multi-user Security
|
2021 |
Diemert, Denis |
Generic Negation of Pair Encodings
|
2021 |
Ambrona, Miguel |
Multiparty Cardinality Testing for Threshold Private Intersection
|
2021 |
Branco, Pedro |
Revisiting (R)CCA Security and Replay Protection
|
2021 |
Badertscher, Christian |
Single-to-Multi-theorem Transformations for Non-interactive Statistical Zero-Knowledge
|
2021 |
Fischlin, Marc |
Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices
|
2021 |
Albrecht, Martin R. |
An Efficient and Generic Construction for Signal’s Handshake (X3DHB): Post-Quantum, State Leakage Secure, and Deniable
|
2021 |
Hashimoto, Keitaro |
Two-Server Distributed ORAM with Sublinear Computation and Constant Rounds
|
2021 |
Hamlin, Ariel |
Transferable E-Cash: A Cleaner Model and the First Practical Instantiation
|
2021 |
Bauer, Balthazar |