Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Next Generation Laconic Cryptography

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Publications

Post Quantum Fuzzy Stealth Signatures and Applications (opens in new window)

Author(s): Sihang Pu, Sri Aravinda Krishnan Thyagarajan, Nico Döttling, Lucjan Hanzlik
Published in: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023,, 2023, ISBN 9798400700507
Publisher: ACM
DOI: 10.1145/3576915.3623148

IBE with Incompressible Master Secret and Small Identity Secrets. (opens in new window)

Author(s): Nico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang
Published in: Theory of Cryptography. TCC 2022., 2022, ISBN 978-3-031-22318-1
Publisher: Springer
DOI: 10.1007/978-3-031-22318-1_21

Efficient Laconic Cryptography from Learning with Errors (opens in new window)

Author(s): Nico Döttling, Dimitris Kolonelos, Russell W. F. Lai, Chuanwei Lin, Giulio Malavolta, Ahmadreza Rahimi
Published in: Advances in Cryptology – EUROCRYPT 2023, 2023, ISBN 978-3-031-30620-4
Publisher: Springer
DOI: 10.1007/978-3-031-30620-4_14

Laconic Function Evaluation for Turing Machines (opens in new window)

Author(s): Nico Döttling, Phillip Gajland, Giulio Malavolta
Published in: Public-Key Cryptography – PKC 2023, 2023, ISBN 978-3-031-31371-4
Publisher: Springer
DOI: 10.1007/978-3-031-31371-4_21

Practical Lattice-Based Distributed Signatures for a Small Number of Signers (opens in new window)

Author(s): Nabil Alkeilani Alkadri, Nico Döttling, Sihang Pu
Published in: Applied Cryptography and Network Security. ACNS 2024., 2024, ISBN 978-3-031-54770-6
Publisher: Springer
DOI: 10.1007/978-3-031-54770-6_15

Rate-1 Fully Local Somewhere Extractable Hashing from DDH (opens in new window)

Author(s): Pedro Branco, Nico Döttling, Akshayaram Srinivasan, Riccardo Zanotto
Published in: Public-Key Cryptography – PKC 2024, 2024, ISBN 978-3-031-57725-3
Publisher: Springer
DOI: 10.1007/978-3-031-57725-3_12

On the Black-Box Complexity of Correlation Intractability (opens in new window)

Author(s): Nico Döttling, Tamer Mour
Published in: Innovations in Theoretical Computer Science Conference (ITCS 2024), 2024, ISSN 1868-8969
Publisher: Schloss Dagstuhl -- Leibniz-Zentrum für Informatik
DOI: 10.4230/LIPICS.ITCS.2024.40

Rate-1 Incompressible Encryption from Standard Assumptions. (opens in new window)

Author(s): Pedro Branco, Nico Döttling, Jesko Dujmovic
Published in: Theory of Cryptography. TCC 2022., 2022, ISBN 978-3-031-22365-5
Publisher: Springer
DOI: 10.1007/978-3-031-22365-5_2

Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate (opens in new window)

Author(s): Pedro Branco, Nico Döttling, Akshayaram Srinivasan
Published in: Advances in Cryptology – EUROCRYPT 2024, 2024, ISBN 978-3-031-58751-1
Publisher: Springer
DOI: 10.1007/978-3-031-58751-1_10

Time-Lock Puzzles with Efficient Batch Solving (opens in new window)

Author(s): Jesko Dujmovic, Rachit Garg, Giulio Malavolta
Published in: EUROCRYPT 2024, 2024, ISBN 978-3-031-58723-8
Publisher: Springer
DOI: 10.1007/978-3-031-58723-8_11

A Framework for Statistically Sender Private OT with Optimal Rate. (opens in new window)

Author(s): Pedro Branco, Nico Döttling, Akshayaram Srinivasan
Published in: Advances in Cryptology – CRYPTO 2023, 2023, ISBN 978-3-031-38557-5
Publisher: Springer
DOI: 10.1007/978-3-031-38557-5_18

Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials (opens in new window)

Author(s): Nico Döttling, Jesko Dujmovic, Antoine Joux
Published in: Lecture Notes in Computer Science, Theory of Cryptography, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-78020-2_15

McFly: Verifiable Encryption to the Future Made Practical (opens in new window)

Author(s): Nico Döttling, Lucjan Hanzlik, Bernardo Magri, Stella Wohnig
Published in: Financial Cryptography and Data Security. FC 2023., 2023, ISBN 978-3-031-47754-6
Publisher: Springer
DOI: 10.1007/978-3-031-47754-6_15

Lower-Bounds on Public-Key Operations in PIR (opens in new window)

Author(s): Jesko Dujmovic, Mohammad Hajiabadi
Published in: EUROCRYPT 2024, 2024, ISBN 978-3-031-58751-1
Publisher: Springer
DOI: 10.1007/978-3-031-58751-1_3

Simple Two-Message OT in the Explicit Isogeny Model (opens in new window)

Author(s): Emmanuela Orsini, Riccardo Zanotto
Published in: Communication in Cryptology, 2024, ISSN 3006-5496
Publisher: IACR
DOI: 10.62056/a39qgy4e-

Journal of Cryptology (opens in new window)

Author(s): Zvika Brakerski, Nico Döttling, Sanjam Garg, Giulio Malavolta
Published in: Journal of Cryptology. (2023), 2023, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/S00145-023-09471-5

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0