- 2024
- M. Satheesh Kumar, P. Ganesh Kumar:
A public static agreement key based cryptography for secure data transmission in WSN based smart environment application. Expert Syst. Appl. 246: 123184 (2024) - Xin Zhang, Kejiang Chen, Jinyang Ding, Yuqi Yang, Weiming Zhang, Nenghai Yu:
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography. IEEE Trans. Inf. Forensics Secur. 19: 3148-3163 (2024) - Sakhybay Tynymbayev, Sergiy Gnatyuk, Margulan Ibraimov, Timur Namazbayev, Assel Mukasheva:
Devices for Modularizing Numbers into a Square in Applications based on Public-Key Cryptography (short paper). CPITS 2024: 513-519 - Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi:
Efficient Pre-processing PIR Without Public-Key Cryptography. EUROCRYPT (6) 2024: 210-240 - Navid Alamati, Varun Maram:
Quantum CCA-Secure PKE, Revisited. Public Key Cryptography (4) 2024: 193-226 - Christian Badertscher, Monosij Maitra, Christian Matt, Hendrik Waldner:
Updatable Policy-Compliant Signatures. Public Key Cryptography (1) 2024: 105-132 - Marco Baldi, Sebastian Bitzer, Alessio Pavoni, Paolo Santini, Antonia Wachter-Zeh, Violetta Weger:
Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem. Public Key Cryptography (2) 2024: 243-274 - Foteini Baldimtsi, Ioanna Karantaidou, Srinivasan Raghuraman:
Oblivious Accumulators. Public Key Cryptography (2) 2024: 99-131 - Claudia Bartoli, Ignacio Cascudo:
On Sigma-Protocols and (Packed) Black-Box Secret Sharing Schemes. Public Key Cryptography (2) 2024: 426-457 - Balthazar Bauer, Georg Fuchsbauer, Fabian Regen:
On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions. Public Key Cryptography (1) 2024: 3-36 - Laurin Benz, Wasilij Beskorovajnov, Sarai Eilebrecht, Roland Gröll, Maximilian Müller, Jörn Müller-Quade:
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions. Public Key Cryptography (4) 2024: 257-288 - Nidhish Bhimrajka, Ashish Choudhury, Supreeth Varadarajan:
Network-Agnostic Multi-party Computation Revisited (Extended Abstract). Public Key Cryptography (2) 2024: 171-204 - Kaartik Bhushan, Sai Lakshmi Bhavana Obbattu, Manoj Prabhakaran, Rajeev Raghunath:
R3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications. Public Key Cryptography (3) 2024: 61-91 - Madalina Bolboceanu, Zvika Brakerski, Devika Sharma:
On Algebraic Embedding for Unstructured Lattices. Public Key Cryptography (3) 2024: 123-154 - Pedro Branco, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto:
Rate-1 Fully Local Somewhere Extractable Hashing from DDH. Public Key Cryptography (3) 2024: 356-386 - Carlo Brunetta, Hans Heum, Martijn Stam:
SoK: Public Key Encryption with Openings. Public Key Cryptography (4) 2024: 35-68 - Matteo Campanelli, Antonio Faonio, Dario Fiore, Tianyu Li, Helger Lipmaa:
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees. Public Key Cryptography (2) 2024: 337-369 - Matteo Campanelli, Dario Fiore, Hamidreza Khoshakhlagh:
Witness Encryption for Succinct Functional Commitments and Applications. Public Key Cryptography (2) 2024: 132-167 - Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone:
Improved Cryptanalysis of HFERP. Public Key Cryptography (1) 2024: 413-440 - Mingjie Chen, Antonin Leroux, Lorenz Panny:
SCALLOP-HD: Group Action from 2-Dimensional Isogenies. Public Key Cryptography (3) 2024: 190-216 - Yu Chen, Min Zhang, Cong Zhang, Minglang Dong, Weiran Liu:
Private Set Operations from Multi-query Reverse Private Membership Test. Public Key Cryptography (3) 2024: 387-416 - Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang:
sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. Public Key Cryptography (1) 2024: 229-258 - Hannah Davis, Matthew D. Green, Nadia Heninger, Keegan Ryan, Adam Suhl:
On the Possibility of a Backdoor in the Micali-Schnorr Generator. Public Key Cryptography (1) 2024: 352-386 - Moumita Dutta, Chaya Ganesh, Neha Jawalkar:
Succinct Verification of Compressed Sigma Protocols in the Updatable SRS Setting. Public Key Cryptography (2) 2024: 305-336 - Daniel Escudero, Ivan Tjuawinata, Chaoping Xing:
On Information-Theoretic Secure Multiparty Computation with Local Repairability. Public Key Cryptography (2) 2024: 205-239 - Steven D. Galbraith, Yi-Fu Lai, Hart Montgomery:
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions. Public Key Cryptography (3) 2024: 36-60 - Rachit Garg, Rishab Goyal, George Lu:
Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption. Public Key Cryptography (4) 2024: 69-104 - Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, Alice Murphy:
Laconic Branching Programs from the Diffie-Hellman Assumption. Public Key Cryptography (3) 2024: 323-355 - Romain Gay, Bogdan Ursu:
On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions. Public Key Cryptography (1) 2024: 74-104 - Cyprien Delpech de Saint Guilhem, Robi Pedersen:
New Proof Systems and an OPRF from CSIDH. Public Key Cryptography (3) 2024: 217-251