Lifting Standard Model Reductions to Common Setup Assumptions
|
2022 |
Nguyen, Ngoc Khanh |
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable
|
2022 |
Aronesty, Erik |
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
|
2022 |
Beskorovajnov, Wasilij |
Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles
|
2022 |
Ishibashi, Ren |
Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake
|
2022 |
Brendel, Jacqueline |
The Direction of Updatable Encryption Does Matter
|
2022 |
Nishimaki, Ryo |
Leakage-Resilient IBE/ABE with Optimal Leakage Rates from Lattices
|
2022 |
Lai, Qiqi |
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
|
2022 |
Haque, Abida |
Efficient Lattice-Based Blind Signatures via Gaussian One-Time Signatures
|
2022 |
Lyubashevsky, Vadim |
Lockable Obfuscation from Circularly Insecure Fully Homomorphic Encryption
|
2022 |
Kluczniak, Kamil |
Lattice-Based Signatures with Tight Adaptive Corruptions and More
|
2022 |
Pan, Jiaxin |
A Note on the Post-quantum Security of (Ring) Signatures
|
2022 |
Chatterjee, Rohit |
Count Me In! Extendability for Threshold Ring Signatures
|
2022 |
Aranha, Diego F. |
On Pairing-Free Blind Signature Schemes in the Algebraic Group Model
|
2022 |
Kastner, Julia |
Financially Backed Covert Security
|
2022 |
Faust, Sebastian |
Efficient Lattice-Based Inner-Product Functional Encryption
|
2022 |
Mera, Jose Maria Bermudo |
KDM Security for the Fujisaki-Okamoto Transformations in the QROM
|
2022 |
Kitagawa, Fuyuki |