- Haruhisa Kosuge, Keita Xagawa
:
Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model. Public Key Cryptography (1) 2024: 259-288 - Hyesun Kwak
, Seonhong Min
, Yongsoo Song
:
Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity. Public Key Cryptography (4) 2024: 354-385 - Anja Lehmann, Cavit Özbay:
Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing. Public Key Cryptography (1) 2024: 196-228 - Yiming Li
, Shengli Liu
:
Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain. Public Key Cryptography (3) 2024: 288-320 - Luying Li
, Wei Yu
, Peng Xu
:
Fast and Simple Point Operations on Edwards448 and E448. Public Key Cryptography (4) 2024: 389-411 - Benoît Libert:
Vector Commitments with Proofs of Smallness: Short Range Proofs and More. Public Key Cryptography (2) 2024: 36-67 - Benoît Libert:
Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk. Public Key Cryptography (2) 2024: 68-98 - Xiuhan Lin
, Moeto Suzuki, Shiduo Zhang, Thomas Espitau
, Yang Yu
, Mehdi Tibouchi
, Masayuki Abe
:
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. Public Key Cryptography (1) 2024: 387-412 - San Ling
, Khoa Nguyen
, Duong Hieu Phan
, Khai Hanh Tang
, Huaxiong Wang
, Yanhong Xu
:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. Public Key Cryptography (1) 2024: 37-73 - Yunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian:
Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions. Public Key Cryptography (4) 2024: 105-126 - Xindong Liu, Li-Ping Wang:
Short Code-Based One-out-of-Many Proofs and Applications. Public Key Cryptography (2) 2024: 370-399 - Daniele Micciancio
, Vinod Vaikuntanathan
:
SoK: Learning with Errors, Circular Security, and Fully Homomorphic Encryption. Public Key Cryptography (4) 2024: 291-321 - Gabrielle De Micheli
, Duhyeong Kim
, Daniele Micciancio
, Adam Suhl:
Faster Amortized FHEW Bootstrapping Using Ring Automorphisms. Public Key Cryptography (4) 2024: 322-353 - Aikaterini Mitrokotsa
, Sayantan Mukherjee
, Mahdi Sedaghat
, Daniel Slamanig
, Jenit Tomy:
Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions. Public Key Cryptography (1) 2024: 163-195 - Jiaxin Pan
, Runzhi Zeng
:
Selective Opening Security in the Quantum Random Oracle Model, Revisited. Public Key Cryptography (3) 2024: 92-122 - Cong Peng
, Rongmao Chen
, Yi Wang
, Debiao He
, Xinyi Huang
:
Parameter-Hiding Order-Revealing Encryption Without Pairings. Public Key Cryptography (4) 2024: 227-256 - Bertram Poettering
, Simon Rastikian:
Formalizing Hash-then-Sign Signatures. Public Key Cryptography (1) 2024: 289-315 - Maria Corte-Real Santos
, Craig Costello
, Sam Frengley
:
An Algorithm for Efficient Detection of (N, N)-Splittings and Its Application to the Isogeny Problem in Dimension 2. Public Key Cryptography (3) 2024: 157-189 - Zhedong Wang, Qiqi Lai, Feng-Hao Liu:
Ring/Module Learning with Errors Under Linear Leakage - Hardness and Applications. Public Key Cryptography (2) 2024: 275-304 - Hongxiao Wang
, Siu-Ming Yiu
, Yanmin Zhao
, Zoe Lin Jiang
:
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. Public Key Cryptography (2) 2024: 3-35 - Wenwen Xia
, Leizhang Wang
, Geng Wang
, Dawu Gu
, Baocang Wang
:
A Refined Hardness Estimation of LWE in Two-Step Mode. Public Key Cryptography (3) 2024: 3-35 - Yuncong Zhang
, Shifeng Sun
, Dawu Gu
:
Efficient KZG-Based Univariate Sum-Check and Lookup Argument. Public Key Cryptography (2) 2024: 400-425 - Yijian Zhang, Jun Zhao, Ziqi Zhu, Junqing Gong, Jie Chen:
Registered Attribute-Based Signature. Public Key Cryptography (1) 2024: 133-162 - Yunxiao Zhou
, Shengli Liu
, Shuai Han
:
Multi-hop Fine-Grained Proxy Re-encryption. Public Key Cryptography (4) 2024: 161-192 - Qiang Tang, Vanessa Teague:
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14601, Springer 2024, ISBN 978-3-031-57720-8 [contents] - Qiang Tang, Vanessa Teague:
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14602, Springer 2024, ISBN 978-3-031-57721-5 [contents] - Qiang Tang, Vanessa Teague:
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14603, Springer 2024, ISBN 978-3-031-57724-6 [contents] - Qiang Tang, Vanessa Teague:
Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 14604, Springer 2024, ISBN 978-3-031-57727-7 [contents] - 2023
- Miguel Ambrona, Romain Gay:
Multi-authority ABE for Non-monotonic Access Structures. Public Key Cryptography (2) 2023: 306-335 - Arasu Arun, Chaya Ganesh, Satya V. Lokam, Tushar Mopuri, Sriram Sridhar
:
Dew: A Transparent Constant-Sized Polynomial Commitment Scheme. Public Key Cryptography (2) 2023: 542-571