


default search action
20th TCC 2022: Chicago, IL, USA - Part I
- Eike Kiltz

, Vinod Vaikuntanathan
:
Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13747, Springer 2022, ISBN 978-3-031-22317-4
Post-quantum Cryptography
- Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs:

Post-quantum Insecurity from LWE. 3-32 - Jelle Don, Serge Fehr, Yu-Hsuan Huang:

Adaptive Versus Static Multi-oracle Algorithms, and Quantum Security of a Split-Key PRF. 33-51 - Jeremiah Blocki

, Blake Holman
, Seunghoon Lee
:
The Parallel Reversible Pebbling Game: Analyzing the Post-quantum Security of iMHFs. 52-79 - Russell W. F. Lai

, Giulio Malavolta
, Nicholas Spooner:
Quantum Rewinding for Many-Round Protocols. 80-109
Interactive Proofs
- Thomas Attema

, Serge Fehr, Michael Klooß
:
Fiat-Shamir Transformation of Multi-round Interactive Proofs. 113-142 - Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta

:
Steganography-Free Zero-Knowledge. 143-172 - Thomas Attema

, Ignacio Cascudo
, Ronald Cramer, Ivan Damgård, Daniel Escudero:
Vector Commitments over Rings and Compressed $\varSigma $-Protocols. 173-202 - Anna Lysyanskaya

, Leah Namisa Rosenbloom
:
Universally Composable $\varSigma $-protocols in the Global Random-Oracle Model. 203-233
Quantum Cryptography
- Prabhanjan Ananth, Aditya Gulati, Luowen Qian, Henry Yuen:

Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications. 237-265 - Navid Alamati, Giulio Malavolta

, Ahmadreza Rahimi:
Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols. 266-293 - Jiahui Liu

, Qipeng Liu
, Luowen Qian
, Mark Zhandry
:
Collusion Resistant Copy-Protection for Watermarkable Functionalities. 294-323
Secret-Sharing and Applications
- Divesh Aggarwal

, Eldon Chung
, Maciej Obremski
, João Ribeiro
:
On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing. 327-354 - Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye, Albert Yu:

Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family. 355-383 - Ittai Abraham, Gilad Asharov

, Shravani Patil, Arpita Patra:
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS. 384-414
Succinct Proofs
- Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:

On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives. 417-446 - Gal Arnon

, Amey Bhangale, Alessandro Chiesa, Eylon Yogev:
A Toolbox for Barriers on Interactive Oracle Proofs. 447-466 - Eli Ben-Sasson

, Dan Carmon
, Swastik Kopparty
, David Levit
:
Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves - (ECFFT Part II). 467-496 - Eduardo Soria-Vazquez

:
Doubly Efficient Interactive Proofs over Infinite and Non-commutative Rings. 497-525 - Rachit Garg, Kristin Sheridan

, Brent Waters, David J. Wu:
Fully Succinct Batch Arguments for sfNP from Indistinguishability Obfuscation. 526-555
Identity-Based Encryption and Functional Encryption
- Mohammad Mahmoody, Wei Qi

, Ahmadreza Rahimi:
Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption. 559-587 - Nico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang:

IBE with Incompressible Master Secret and Small Identity Secrets. 588-617 - Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki

, Shota Yamada
, Takashi Yamakawa:
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions. 618-647
Attribute-Based Encryption and Functional Encryption
- Brent Waters, Hoeteck Wee, David J. Wu:

Multi-authority ABE from Lattices Without Random Oracles. 651-679 - Hanjun Li

, Huijia Lin, Ji Luo
:
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security. 680-710 - Shweta Agrawal, Rishab Goyal, Junichi Tomida

:
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality. 711-740

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














