Traitor Tracing with N1/3-Size Ciphertexts and O(1)-Size Keys from k-Lin

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:EUROCRYPT (42. : 2023 : Lyon) Advances in cryptology - EUROCRYPT 2023 ; Part 3
1. Verfasser: Gong, Junging (VerfasserIn)
Weitere Verfasser: Luo, Ji (VerfasserIn), Wee, Hoeteck (VerfasserIn)
Pages:2023
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Deniable Authentication When Signing Keys Leak 2023 Chakraborty, Suvradip
Succinct Vector, Polynomial, and Functional Commitments from Lattices 2023 Wee, Hoeteck
Fully Adaptive Decentralized Multi-Authority ABE 2023 Datta, Pratish
On Differential Privacy and Adaptive Data Analysis with Bounded Space 2023 Dinur, Itai
Almost Tight Multi-user Security Under Adaptive Corruptions & Leakages in the Standard Model 2023 Han, Shuai
Privately Puncturing PRFs from Lattices: Adaptive Security and Collusion Resistant Pseudorandomness 2023 Yang, Rupeng
Batch Bootstrapping I: A New Framework for SIMD Bootstrapping in Polynomial Modulus 2023 Liu, Feng-Hao
Functional Commitments for All Functions, with Transparent Setup and from SIS 2023 Castro, Leo de
Efficient Laconic Cryptography from Learning with Errors 2023 Déttling, Nico
Batch Bootstrapping II: Bootstrapping in Polynomial Modulus only Requires O(1) FHE Multiplications in Amortization 2023 Liu, Feng-Hao
Multi-key and Multi-input Predicate Encryption from Learning with Errors 2023 Francati, Danilo
A Theory of Composition for Differential Obliviousness 2023 Zhou, Mingxun
Efficient FHEW Bootstrapping with Small Evaluation Keys, and Applications to Threshold Homomorphic Encryption 2023 Lee, Yongwoo
On Polynomial Functions Modulo pe and Faster Bootstrapping for Homomorphic Encryption 2023 Geelen, Robin
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption 2023 Jain, Aayush
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise 2023 Jaeger, Joseph
Constrained Pseudorandom Functions from Homomorphic Secret Sharing 2023 Couteau, Geoffroy
Registered Attribute-Based Encryption 2023 Hohenberger, Susan
Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness 2023 Agrawal, Shweta
Unbounded Quadratic Functional Encryption and More from Pairings 2023 Tomida, Junichi
Alle Artikel auflisten