default search action
29th ASIACRYPT 2023: Guangzhou, China - Part I
- Jian Guo, Ron Steinfeld:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14438, Springer 2023, ISBN 978-981-99-8720-7
Secure Multi-party Computation
- Yann Disser, Daniel Günther, Thomas Schneider, Maximilian Stillger, Arthur Wigandt, Hossein Yalame:
Breaking the Size Barrier: Universal Circuits Meet Lookup Tables. 3-37 - Fuchun Lin, Chaoping Xing, Yizhou Yao, Chen Yuan:
Amortized NISC over $\mathbb {Z}_{2^k}$ from RMFE. 38-70 - Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai:
Two-Round Concurrent 2PC from Sub-exponential LWE. 71-105 - Daniel Escudero, Cheng Hong, Hongqing Liu, Chaoping Xing, Chen Yuan:
Degree-D Reverse Multiplication-Friendly Embeddings: Constructions and Applications. 106-138 - Estuardo Alpirez Bock, Chris Brzuska, Pihla Karanko, Sabine Oechsner, Kirthivaasan Puniamurthy:
Adaptive Distributional Security for Garbling Schemes with 𝒪(|x|) Online Complexity. 139-171 - Mariana Gama, Emad Heydari Beni, Emmanuela Orsini, Nigel P. Smart, Oliver Zajonc:
MPC with Delayed Parties over Star-Like Networks. 172-203 - Hongqing Liu, Chaoping Xing, Yanjiang Yang, Chen Yuan:
Ramp Hyper-invertible Matrices and Their Applications to MPC Protocols. 204-236 - Xiang Liu, Ying Gao:
Scalable Multi-party Private Set Union from Multi-query Secret-Shared Private Membership Test. 237-271 - Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. 272-301 - Hanjun Li, Huijia Lin, Antigoni Polychroniadou, Stefano Tessaro:
LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking. 302-334 - Reo Eriguchi:
Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity. 335-368
Threshold Cryptography
- Katharina Boudgoust, Peter Scholl:
Simple Threshold (Fully Homomorphic) Encryption from LWE with Polynomial Modulus. 371-404 - Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen:
VSS from Distributed ZK Proofs and Applications. 405-440 - Thibauld Feneuil, Matthieu Rivain:
Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head. 441-473
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.