Post-quantum Insecurity from LWE
|
2022 |
Lombardi, Alex |
Steganography-Free Zero-Knowledge
|
2022 |
Abdolmaleki, Behzad |
Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications
|
2022 |
Ananth, Prabhanjan |
Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family
|
2022 |
Maji, Hemanta K. |
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS
|
2022 |
Abraham, Ittai |
IBE with Incompressible Master Secret and Small Identity Secrets
|
2022 |
Döttling, Nico |
Vector Commitments over Rings and Compressed Σ-Protocols
|
2022 |
Attema, Thomas |
Quantum Rewinding for Many-Round Protocols
|
2022 |
Lai, Russell W. F. |
A Toolbox for Barriers on Interactive Oracle Proofs
|
2022 |
Arnon, Gal |
Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption
|
2022 |
Mahmoody, Mohammad |
Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves: (ECFFT Part II)
|
2022 |
Ben–Sasson, Eli |
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions
|
2022 |
Agrawal, Shweta |
Multi-authority ABE from Lattices Without Random Oracles
|
2022 |
Waters, Brent |
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality
|
2022 |
Agrawal, Shweta |
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security
|
2022 |
Li, Hanjun |
Universally Composable Σ-protocols in the Global Random-Oracle Model
|
2022 |
Lysyanskaya, Anna |
Collusion Resistant Copy-Protection for Watermarkable Functionalities
|
2022 |
Liu, Jiahui |
Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation
|
2022 |
Garg, Rachit |
Adaptive Versus Static Multi-oracle Algorithms, and Quantum Security of a Split-Key PRF
|
2022 |
Don, Jelle |
The Parallel Reversible Pebbling Game: Analyzing the Post-quantum Security of iMHFs
|
2022 |
Blocki, Jeremiah |