default search action
41st EUROCRYPT 2022: Trondheim, Norway - Part II
- Orr Dunkelman, Stefan Dziembowski:
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13276, Springer 2022, ISBN 978-3-031-07084-6
Cryptographic Protocols
- Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan:
Single-Server Private Information Retrieval with Sublinear Amortized Time. 3-33 - Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Anamorphic Encryption: Private Communication Against a Dictator. 34-63 - Gal Arnon, Alessandro Chiesa, Eylon Yogev:
A PCP Theorem for Interactive Proofs and Applications. 64-94 - Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore:
Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient. 95-126 - Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
Asymmetric PAKE with Low Computation and communication. 127-156 - Zvika Brakerski, Pedro Branco, Nico Döttling, Sihang Pu:
Batch-OT with Optimal Rate. 157-186 - Laasya Bangalore, Rafail Ostrovsky, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam:
Adaptively Secure Computation for RAM Programs. 187-216 - Hoeteck Wee:
Optimal Broadcast Encryption and CP-ABE from Evasive Lattice Assumptions. 217-241 - Daniel Rausch, Ralf Küsters, Céline Chevalier:
Embedding the UC Model into the IITM Model. 242-272
Zero-Knowledge Proofs
- Jonathan Bootle, Alessandro Chiesa, Siqi Liu:
Zero-Knowledge IOPs with Linear-Time Prover and Polylogarithmic-Time Verifier. 275-304 - Yuyu Wang, Jiaxin Pan:
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security. 305-335 - Megan Chen, Alessandro Chiesa, Nicholas Spooner:
On Succinct Non-interactive Arguments in Relativized Worlds. 336-366 - Youssef El Housni, Aurore Guillevic:
Families of SNARK-Friendly 2-Chains of Elliptic Curves. 367-396 - Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, Daniel Tschudi:
Fiat-Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model). 397-426 - Jonathan Bootle, Alessandro Chiesa, Yuncong Hu, Michele Orrù:
Gemini: Elastic SNARKs for Diverse Environments. 427-457 - Aarushi Goel, Matthew Green, Mathias Hall-Andersen, Gabriel Kaptchuk:
Stacking Sigmas: A Framework to Compose $\varSigma $-Protocols for Disjunctions. 458-487 - Benoît Libert, Khoa Nguyen, Thomas Peters, Moti Yung:
One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model. 488-519 - James Hulett, Ruta Jawale, Dakshita Khurana, Akshayaram Srinivasan:
SNARGs for P from Sub-exponential DDH and QR. 520-549
Cryptographic Primitives
- Fuchun Guo, Willy Susilo:
Optimal Tightness for Chain-Based Unique Signatures. 553-583 - Chris Brzuska, Geoffroy Couteau:
On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness. 584-613 - Jeremiah Blocki, Seunghoon Lee:
On the Multi-user Security of Short Schnorr Signatures with Preprocessing. 614-643 - Ueli Maurer, Christopher Portmann, Guilherme Rito:
Multi-Designated Receiver Signed Public Key Encryption. 644-673 - Nirvan Tyagi, Sofía Celi, Thomas Ristenpart, Nick Sullivan, Stefano Tessaro, Christopher A. Wood:
A Fast and Simple Partially Oblivious PRF, with Applications. 674-705 - Ashrujit Ghoshal, Riddhi Ghosal, Joseph Jaeger, Stefano Tessaro:
Hiding in Plain Sight: Memory-Tight Proofs via Randomness Programming. 706-735 - Rachit Garg, Rishab Goyal, George Lu, Brent Waters:
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption. 736-763 - Nils Fleischhacker, Kasper Green Larsen, Mark Simkin:
Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions. 764-781 - Stefano Tessaro, Chenzhi Zhu:
Short Pairing-Free Blind Signatures with Exponential Security. 782-811
Real-World Systems
- Joël Alwen, Benedikt Auerbach, Miguel Cueto Noval, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter:
CoCoA: Concurrent Continuous Group Key Agreement. 815-844 - Mihir Bellare, Viet Tung Hoang:
Efficient Schemes for Committing Authenticated Encryption. 845-875 - Hannah Davis, Denis Diemert, Felix Günther, Tibor Jager:
On the Concrete Security of TLS 1.3 PSK Mode. 876-906
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.