Deniable Authentication When Signing Keys Leak
|
2023 |
Chakraborty, Suvradip |
Succinct Vector, Polynomial, and Functional Commitments from Lattices
|
2023 |
Wee, Hoeteck |
Fully Adaptive Decentralized Multi-Authority ABE
|
2023 |
Datta, Pratish |
On Differential Privacy and Adaptive Data Analysis with Bounded Space
|
2023 |
Dinur, Itai |
Almost Tight Multi-user Security Under Adaptive Corruptions & Leakages in the Standard Model
|
2023 |
Han, Shuai |
Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness
|
2023 |
Yang, Rupeng |
Batch Bootstrapping I: A New Framework for SIMD Bootstrapping in Polynomial Modulus
|
2023 |
Liu, Feng-Hao |
Functional Commitments for All Functions, with Transparent Setup and from SIS
|
2023 |
Castro, Leo de |
Efficient Laconic Cryptography from Learning with Errors
|
2023 |
Déttling, Nico |
Batch Bootstrapping II: Bootstrapping in Polynomial Modulus only Requires O(1) FHE Multiplications in Amortization
|
2023 |
Liu, Feng-Hao |
Multi-key and Multi-input Predicate Encryption from Learning with Errors
|
2023 |
Francati, Danilo |
A Theory of Composition for Differential Obliviousness
|
2023 |
Zhou, Mingxun |
Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption
|
2023 |
Lee, Yongwoo |
On Polynomial Functions Modulo pe and Faster Bootstrapping for Homomorphic Encryption
|
2023 |
Geelen, Robin |
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption
|
2023 |
Jain, Aayush |
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise
|
2023 |
Jaeger, Joseph |
Constrained Pseudorandom Functions from Homomorphic Secret Sharing
|
2023 |
Couteau, Geoffroy |
Registered Attribute-Based Encryption
|
2023 |
Hohenberger, Susan |
Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness
|
2023 |
Agrawal, Shweta |
Unbounded Quadratic Functional Encryption and More from Pairings
|
2023 |
Tomida, Junichi |