Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE
|
2020 |
Baum, Carsten |
Efficient 3-Party Distributed ORAM
|
2020 |
Bunn, Paul |
Gradual GRAM and Secure Computation for RAM Programs
|
2020 |
Hazay, Carmit |
Secure Generalized Deduplication via Multi-Key Revealing Encryption
|
2020 |
Lucani, Daniel E. |
Fast Threshold ECDSA with Honest Majority
|
2020 |
Damgård, Ivan |
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions
|
2020 |
Derler, David |
The Round Complexity of Secure Computation Against Covert Adversaries
|
2020 |
Choudhuri, Arka Rai |
Account Management in Proof of Stake Ledgers
|
2020 |
Karakostas, Dimitris |
Tight Verifiable Delay Functions
|
2020 |
Döttling, Nico |
Black-Box Constructions of Bounded-Concurrent Secure Computation
|
2020 |
Garg, Sanjam |
UC-Secure OT from LWE, Revisited
|
2020 |
Quach, Willy |
Efficient Signatures on Randomizable Ciphertexts
|
2020 |
Bauer, Balthazar |
Anonymous Symmetric-Key Communication
|
2020 |
Banfi, Fabio |
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model
|
2020 |
Abdalla, Michel |
On the Query Complexity of Constructing PRFs from Non-adaptive PRFs
|
2020 |
Soni, Pratik |
Separating Symmetric and Asymmetric Password-Authenticated Key Exchange
|
2020 |
Hesse, Julia |
Key-and-Argument-Updatable QA-NIZKs
|
2020 |
Lipmaa, Helger |
Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit
|
2020 |
Pass, Rafael |
Aggregatable Subvector Commitments for Stateless Cryptocurrencies
|
2020 |
Tomescu, Alin |
Afgjort: A Partially Synchronous Finality Layer for Blockchains
|
2020 |
Dinsdale-Young, Thomas |