Skip to main content
European Commission logo print header

Preparing Cryptography for Modern Applications

Publications

Two-Party Adaptor Signatures from Identification Schemes

Author(s): Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi
Published in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I, Issue 12710, 2021, Page(s) 451-480, ISBN 978-3-030-75244-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-75245-3_17

Inner-Product Functional Encryption with Fine-Grained Access Control

Author(s): Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Issue 12493, 2020, Page(s) 467-497, ISBN 978-3-030-64839-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64840-4_16

Universally Composable Subversion-Resilient Cryptography

Author(s): Suvradip Chakraborty; Bernardo Magri; Jesper Buus Nielsen; Daniele Venturi
Published in: Advances in Cryptology - EUROCRYPT 2022, Issue 13275, 2022, Page(s) 272-302
Publisher: Springer
DOI: 10.1007/978-3-031-06944-4_10

Grafting Key Trees: Efficient Key Management for Overlapping Groups

Author(s): Joël Alwen; Benedikt Auerbach; Mirza Ahad Baig; Miguel Cueto Noval; Karen Klein; Guillermo Pascual-Perez; Krzysztof Pietrzak; Michael Walter
Published in: Theory of Cryptography - Proceedings of TCC 2021, Issue 13044, 2021, Page(s) 222-253
Publisher: Springer
DOI: 10.1007/978-3-030-90456-2_8

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO

Author(s): Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Issue 12110, 2020, Page(s) 187-219, ISBN 978-3-030-45373-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45374-9_7

On Treewidth, Separators and Yao’s Garbling

Author(s): Chethan Kamath; Karen Klein; Krzysztof Pietrzak
Published in: Theory of Cryptography - TCC 2021, Issue 13043, 2021, Page(s) 486-517
Publisher: Springer
DOI: 10.1007/978-3-030-90453-1_17

The Cost of Adaptivity in Security Games on Graphs

Author(s): Chethan Kamath; Karen Klein; Krzysztof Pietrzak; Michael Walter
Published in: Theory of Cryptography - Proceedings of TCC 2021, Issue 13043, 2021, Page(s) 550-581
Publisher: Springer
DOI: 10.1007/978-3-030-90453-1_19

COA-Secure Obfuscation and Applications

Author(s): Ran Canetti; Suvradip Chakraborty; Dakshita Khurana; Nishant Kumar; Oxana Poburinnaya; Manoj Prabhakaran
Published in: Advances in Cryptology - EUROCRYPT 2022, Issue 13275, 2022, Page(s) 731-758
Publisher: Springer
DOI: 10.1007/978-3-031-06944-4_25

Towards Tight Adaptive Security of Non-Interactive Key Exchange

Author(s): Julia Hesse; Dennis Hofheinz; Lisa Kohl; Roman Langrehr
Published in: Theory of Cryptography - TCC 2021, Issue 13044, 2021, Page(s) 286-316
Publisher: Springer
DOI: 10.1007/978-3-030-90456-2_10

Impossibility Results for Lattice-Based Functional Encryption Schemes

Author(s): Akın Ünal
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I, Issue 12105, 2020, Page(s) 169-199, ISBN 978-3-030-45720-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45721-1_7

Non-interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions

Author(s): Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 442-471, ISBN 978-3-030-45726-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_15

On Instantiating the Algebraic Group Model from Falsifiable Assumptions

Author(s): Thomas Agrikola, Dennis Hofheinz, Julia Kastner
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II, Issue 12106, 2020, Page(s) 96-126, ISBN 978-3-030-45723-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45724-2_4

On Pairing-Free Blind Signature Schemes in the Algebraic Group Model

Author(s): Julia Kastner; Julian Loss; Jiayu Xu
Published in: Public-Key Cryptography - PKC 2022, Issue 13178, 2022, Page(s) 468-497
Publisher: Springer
DOI: 10.1007/978-3-030-97131-1_16

CoCoA: Concurrent Continuous Group Key Agreement

Author(s): Joël Alwen; Benedikt Auerbach; Miguel Cueto Noval; Karen Klein; Guillermo Pascual-Perez; Krzysztof Pietrzak; Michael Walter
Published in: Advances in Cryptology - EUROCRYPT 2022, Issue 13276, 2022, Page(s) 815-844
Publisher: Springer
DOI: 10.1007/978-3-031-07085-3_28

Interactively Secure Groups from Obfuscation

Author(s): Thomas Agrikola, Dennis Hofheinz
Published in: Public-Key Cryptography – PKC 2018, Issue 10770, 2018, Page(s) 341-370, ISBN 978-3-319-76580-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-76581-5_12

Graded Encoding Schemes from Obfuscation

Author(s): Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia
Published in: Public-Key Cryptography – PKC 2018, Issue 10770, 2018, Page(s) 371-400, ISBN 978-3-319-76580-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-76581-5_13

New Protocols for Secure Equality Test and Comparison

Author(s): Geoffroy Couteau
Published in: Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 303-320, ISBN 978-3-319-93386-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-93387-0_16

Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge

Author(s): Pyrros Chaidos, Geoffroy Couteau
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10822, 2018, Page(s) 193-221, ISBN 978-3-319-78371-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-78372-7_7

On the Concrete Security of Goldreich’s Pseudorandom Generator

Author(s): Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
Published in: Dynamics and Control of Industrial Cranes, 2019, Page(s) 96-124, ISBN 978-981-13-5769-5
Publisher: Springer Singapore
DOI: 10.1007/978-3-030-03329-3_4

Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings

Author(s): Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 597-627, ISBN 978-3-319-96883-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96884-1_20

Dual-Mode NIZKs from Obfuscation

Author(s): Dennis Hofheinz, Bogdan Ursu
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I, Issue 11921, 2019, Page(s) 311-341, ISBN 978-3-030-34577-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-34578-5_12

Designated-Verifier Pseudorandom Generators, and Their Applications

Author(s): Geoffroy Couteau, Dennis Hofheinz
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 562-592, ISBN 978-3-030-17655-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_20

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 489-518, ISBN 978-3-030-26953-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26954-8_16

A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model

Author(s): Geoffroy Couteau
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 473-503, ISBN 978-3-030-17655-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_17

Homomorphic Secret Sharing from Lattices Without FHE

Author(s): Elette Boyle, Lisa Kohl, Peter Scholl
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 3-33, ISBN 978-3-030-17655-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_1

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 291-308, ISBN 9781-450367479
Publisher: ACM
DOI: 10.1145/3319535.3354255

Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures

Author(s): Aumayr, Lukas; Ersoy, O.; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash; Tibouchi, Mehdi; Wang, Huaxiong
Published in: Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 2, Issue 13091, 2021, Page(s) 635-664
Publisher: Springer
DOI: 10.1007/978-3-030-92075-3_22

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available