


default search action
26th PKC 2023: Atlanta, GA, USA - Part II
- Alexandra Boldyreva, Vladimir Kolesnikov

:
Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II. Lecture Notes in Computer Science 13941, Springer 2023, ISBN 978-3-031-31370-7
Homomorphic Cryptography and Other Topics
- Thomas Attema

, Pedro Capitão, Lisa Kohl:
On Homomorphic Secret Sharing from Polynomial-Modulus LWE. 3-32 - KangHoon Lee, Ji Won Yoon:

Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption. 33-62 - Giuseppe Ateniese, Long Chen, Danilo Francati

, Dimitrios Papadopoulos, Qiang Tang
:
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting). 63-93 - Markus Krausz

, Georg Land
, Jan Richter-Brockmann
, Tim Güneysu
:
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling. 94-124
MPC
- Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Wenxuan Wu, Yupeng Zhang:

Private Polynomial Commitments and Applications to MPC. 127-158 - Sanjam Garg, Mohammad Hajiabadi, Abhishek Jain, Zhengzhong Jin, Omkant Pandey, Sina Shiehian:

Credibility in Private Set Membership. 159-189 - Dung Bui, Geoffroy Couteau:

Improved Private Set Intersection for Sets with Small Entries. 190-220 - Geoffroy Couteau, Clément Ducros

:
Pseudorandom Correlation Functions from Variable-Density LPN, Revisited. 221-250 - Satrajit Ghosh, Mark Simkin

:
Threshold Private Set Intersection with Better Communication Complexity. 251-272
Encryption
- Antonio Faonio, Dennis Hofheinz, Luigi Russo

:
Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption. 275-305 - Miguel Ambrona, Romain Gay:

Multi-authority ABE for Non-monotonic Access Structures. 306-335 - Carlo Brunetta

, Hans Heum
, Martijn Stam
:
Multi-instance Secure Public-Key Encryption. 336-367 - Peihan Miao, Sikhar Patranabis, Gaven J. Watson:

Unidirectional Updatable Encryption and Proxy Re-encryption from DDH. 368-398 - Yao Jiang Galteland

, Jiaxin Pan
:
Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption. 399-428 - Geng Wang, Shi-Feng Sun, Zhedong Wang, Dawu Gu:

Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications. 429-458
ZK I
- Pierre-Alain Fouque

, Adela Georgescu
, Chen Qian
, Adeline Roux-Langlois
, Weiqiang Wen
:
A Generic Transform from Multi-round Interactive Proof to NIZK. 461-481 - Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:

Fine-Grained Verifier NIZK and Its Applications. 482-511 - Dimitris Kolonelos, Mary Maller, Mikhail Volkhov:

Zero-Knowledge Arguments for Subverted RSA Groups. 512-541 - Arasu Arun, Chaya Ganesh, Satya V. Lokam, Tushar Mopuri, Sriram Sridhar

:
Dew: A Transparent Constant-Sized Polynomial Commitment Scheme. 542-571
IO and ZK II
- Riddhi Ghosal, Amit Sahai, Brent Waters:

Non-Interactive Publicly-Verifiable Delegation of Committed Programs. 575-605 - Nico Döttling, Phillip Gajland, Giulio Malavolta

:
Laconic Function Evaluation for Turing Machines. 606-634 - Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:

A Map of Witness Maps: New Definitions and Connections. 635-662 - Matteo Campanelli

, Danilo Francati
, Claudio Orlandi:
Structure-Preserving Compilers from New Notions of Obfuscations. 663-693

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














