Adaptively Secure Computation for RAM Programs
|
2022 |
Bangalore, Laasya |
Embedding the UC Model into the HTM Model
|
2022 |
Rausch, Daniel |
Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifer
|
2022 |
Bootle, Jonathan |
Families of SNARK-Friendly 2-Chains of Elliptic Curves
|
2022 |
Housni, Youssef El |
Stacking Sigmas: A Framework to Compose ∑-Protocols for Disjunctions
|
2022 |
Goel, Aarushi |
Multi-Designated Receiver Signed Public Key Encryption
|
2022 |
Maurer, Ueli |
Hiding in Plain Sight: Memory- Tight Proofs via Randomness Programming
|
2022 |
Ghoshal, Ashrujit |
CoCoA: Concurrent Continuous Group Key Agreement
|
2022 |
Alwen, Joël |
Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient
|
2022 |
Beullens, Ward |
Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions
|
2022 |
Wee, Hoeteck |
On Succinct Non-interactive Arguments in Relativized Worlds
|
2022 |
Chen, Megan |
One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model
|
2022 |
Libert, Benoît |
On the Concrete Security of TLS 1.3 PSK Mode
|
2022 |
Davis, Hannah |
Anamorphic Encryption: Private Communication Against a Dictator
|
2022 |
Persiano, Giuseppe |
Asymmetric PAKE with Low Computation and communication
|
2022 |
Santos, Bruno Freitas Dos |
Batch-OT with Optimal Rate
|
2022 |
Brakerski, Zvika |
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
|
2022 |
Wang, Yuyu |
On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness
|
2022 |
Brzuska, Chris |
A Fast and Simple Partially Oblivious PRF, with Applications
|
2022 |
Tyagi, Nirvan |
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
|
2022 |
Garg, Rachit |