default search action
43rd CRYPTO 2023, Santa Barbara, CA, USA - Part IV
- Helena Handschuh, Anna Lysyanskaya:
Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14084, Springer 2023, ISBN 978-3-031-38550-6
Faster Fully Homomorphic Encryption
- Binwu Xiang, Jiang Zhang, Yi Deng, Yiran Dai, Dengguo Feng:
Fast Blind Rotation for Bootstrapping FHEs. 3-36 - Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Jai Hyun Park, Damien Stehlé:
HERMES: Efficient Ring Packing Using MLWE Ciphertexts and Application to Transciphering. 37-69 - Miran Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Accelerating HE Operations from Key Decomposition Technique. 70-92
Oblivious RAM
- Surya Mathialagan, Neekon Vafa:
MacORAMa: Optimal Oblivious RAM with Integrity. 95-127 - David Heath, Vladimir Kolesnikov, Rafail Ostrovsky:
Tri-State Circuits - A Circuit Model that Captures RAM. 128-160 - Giuseppe Persiano, Kevin Yeo:
Limits of Breach-Resistant and Snapshot-Oblivious RAMs. 161-196 - Kevin Yeo:
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications. 197-230
Obfuscation
- Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs:
The Pseudorandom Oracle Model and Ideal Obfuscation. 233-262 - Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry:
Computational Wiretap Coding from Indistinguishability Obfuscation. 263-293
Secure Messaging
- Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager:
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation. 297-329 - Gareth T. Davies, Sebastian H. Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horváth, Tibor Jager:
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol. 330-361 - Khashayar Barooti, Daniel Collins, Simone Colombo, Loïs Huguenin-Dumittan, Serge Vaudenay:
On Active Attack Detection in Messaging with Immediate Decryption. 362-395 - Joël Alwen, Marta Mularczyk, Yiannis Tselekounis:
Fork-Resilient Continuous Group Key Agreement. 396-429
Functional Encryption
- Jiaxin Guan, Alexis Korb, Amit Sahai:
Streaming Functional Encryption. 433-463 - Shweta Agrawal, Junichi Tomida, Anshu Yadav:
Attribute-Based Multi-input FE (and More) for Attribute-Weighted Sums. 464-497 - Cody Freitag, Brent Waters, David J. Wu:
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More. 498-531 - Shweta Agrawal, Mélissa Rossi, Anshu Yadav, Shota Yamada:
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE. 532-564
Correlated Pseudorandomness
- Maxime Bombar, Geoffroy Couteau, Alain Couvreur, Clément Ducros:
Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding. 567-601 - Srinivasan Raghuraman, Peter Rindal, Titouan Tanguy:
Expand-Convolute Codes for Pseudorandom Correlation Generators from LPN. 602-632
Proof Systems in the Discrete-Logarithm Setting
- Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang:
Correlation Intractability and SNARGs from Sub-exponential DDH. 635-668 - Abhiram Kothapalli, Bryan Parno:
Algebraic Reductions of Knowledge. 669-701 - Emanuele Giunta:
On the Impossibility of Algebraic NIZK in Pairing-Free Groups. 702-730 - Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach:
A Note on Non-interactive Zero-Knowledge from CDH. 731-764
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.