Practical Sublinear Proofs for R1CS from Lattices
|
2022 |
Nguyen, Ngoc Khanh |
Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable (Extended Abstract)
|
2022 |
Albrecht, Martin R. |
Ofelimos: Combinatorial Optimization via Proof-of-Useful-Work: A Provably Secure Blockchain Protocol
|
2022 |
Fitzi, Matthias |
Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem
|
2022 |
Boudgoust, Katharina |
Public-Key Watermarking Schemes for Pseudorandom Functions
|
2022 |
Yang, Rupeng |
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM
|
2022 |
Don, Jelle |
Locally Verifiable Signature and Key Aggregation
|
2022 |
Goyal, Rishab |
horter Hash-and-Sign Lattice-Based Signatures
|
2022 |
Espitau, Thomas |
On the Feasibility of Unclonable Encryption, and More
|
2022 |
Ananth, Prabhanjan |
On Codes and Learning with Errors over Function Fields
|
2022 |
Bombar, Maxime |
CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs
|
2022 |
Cremers, Cas |
Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General
|
2022 |
Lyubashevsky, Vadim |
Universally Composable End-to-End Secure Messaging
|
2022 |
Canetti, Ran |
On the Impossibility of Key Agreements from Quantum Random Oracles
|
2022 |
Austrin, Per |
MuSig-L: Lattice-Based Multi-signature with Single-Round Online Phase
|
2022 |
Boschini, Cecilia |
Practical Statistically-Sound Proofs of Exponentiation in Any Group
|
2022 |
Hoffmann, Charlotte |
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks
|
2022 |
Matt, Christian |
Multimodal Private Signatures
|
2022 |
Nguyen, Khoa |
On the Insider Security of MLS
|
2022 |
Alwen, Joël |
A New Framework for More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling
|
2022 |
Pino, Rafael del |