Dory: Efficient, Transparent Arguments for Generalised Inner Products and Polynomial Commitments
|
2021 |
Lee, Jonathan |
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
|
2021 |
Benhamouda, Fabrice |
Blockchains Enable Non-interactive MPC
|
2021 |
Goyal, Vipul |
Distributed Merkle’s Puzzles
|
2021 |
Dinur, Itat |
Trojan-Resilience Without Cryptography
|
2021 |
Chakraborty, Suvradip |
Simple Constructions from (Almost) Regular One-Way Functions
|
2021 |
Mazor, Noam |
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds
|
2021 |
Choudhuri, Arka Rai |
Concurrent Composition of Differential Privacy
|
2021 |
Vadhan, Salil |
The Cost of Adaptivity in Security Games on Graphs
|
2021 |
Kamath, Chethan |
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger
|
2021 |
Badertscher, Christian |
Polynomial-Time Targeted Attacks on Coin Tossing for Any Number of Corruptions
|
2021 |
Etesami, Omid |
On Communication-Efficient Asynchronous MPC with Adaptive Security
|
2021 |
Chopard, Annick |
Multi-Party Functional Encryption
|
2021 |
Agrawal, Shweta |
Succinct LWE Sampling, Random Polynomials, and Obfuscation
|
2021 |
Devadas, Lalita |
Continuously Non-malleable Secret Sharing: Joint Tampering, Plain Model and Capacity
|
2021 |
Brian, Gianluca |
Efficient Perfectly Secure Computation with Optimal Resilience
|
2021 |
Abraham, Ittai |
On Communication Models and Best-Achievable Security in Two-Round MPC
|
2021 |
Goel, Aarushi |
ABE for DFA from LWE Against Boundea Collusions, Revisited
|
2021 |
Wee, Hoeteck |
Disappearing Cryptography in the Bounded Storage Model
|
2021 |
Guan, Jiaxin |
On Derandomizing Yao’s Weak-to-Strong OWF Construction
|
2021 |
Brzuska, Chris |