Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Preparing Cryptography for Modern Applications

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Two-Party Adaptor Signatures from Identification Schemes (opens in new window)

Author(s): Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi
Published in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I, Issue 12710, 2021, Page(s) 451-480, ISBN 978-3-030-75244-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-75245-3_17

Inner-Product Functional Encryption with Fine-Grained Access Control (opens in new window)

Author(s): Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Issue 12493, 2020, Page(s) 467-497, ISBN 978-3-030-64839-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64840-4_16

Universally Composable Subversion-Resilient Cryptography (opens in new window)

Author(s): Suvradip Chakraborty; Bernardo Magri; Jesper Buus Nielsen; Daniele Venturi
Published in: Advances in Cryptology - EUROCRYPT 2022, Issue 13275, 2022, Page(s) 272-302
Publisher: Springer
DOI: 10.1007/978-3-031-06944-4_10

Grafting Key Trees: Efficient Key Management for Overlapping Groups (opens in new window)

Author(s): Joël Alwen; Benedikt Auerbach; Mirza Ahad Baig; Miguel Cueto Noval; Karen Klein; Guillermo Pascual-Perez; Krzysztof Pietrzak; Michael Walter
Published in: Theory of Cryptography - Proceedings of TCC 2021, Issue 13044, 2021, Page(s) 222-253
Publisher: Springer
DOI: 10.1007/978-3-030-90456-2_8

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO (opens in new window)

Author(s): Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Issue 12110, 2020, Page(s) 187-219, ISBN 978-3-030-45373-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45374-9_7

On Treewidth, Separators and Yao’s Garbling (opens in new window)

Author(s): Chethan Kamath; Karen Klein; Krzysztof Pietrzak
Published in: Theory of Cryptography - TCC 2021, Issue 13043, 2021, Page(s) 486-517
Publisher: Springer
DOI: 10.1007/978-3-030-90453-1_17

The Cost of Adaptivity in Security Games on Graphs (opens in new window)

Author(s): Chethan Kamath; Karen Klein; Krzysztof Pietrzak; Michael Walter
Published in: Theory of Cryptography - Proceedings of TCC 2021, Issue 13043, 2021, Page(s) 550-581
Publisher: Springer
DOI: 10.1007/978-3-030-90453-1_19

COA-Secure Obfuscation and Applications (opens in new window)

Author(s): Ran Canetti; Suvradip Chakraborty; Dakshita Khurana; Nishant Kumar; Oxana Poburinnaya; Manoj Prabhakaran
Published in: Advances in Cryptology - EUROCRYPT 2022, Issue 13275, 2022, Page(s) 731-758
Publisher: Springer
DOI: 10.1007/978-3-031-06944-4_25

Towards Tight Adaptive Security of Non-Interactive Key Exchange (opens in new window)

Author(s): Julia Hesse; Dennis Hofheinz; Lisa Kohl; Roman Langrehr
Published in: Theory of Cryptography - TCC 2021, Issue 13044, 2021, Page(s) 286-316
Publisher: Springer
DOI: 10.1007/978-3-030-90456-2_10

Impossibility Results for Lattice-Based Functional Encryption Schemes (opens in new window)

Author(s): Akın Ünal
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I, Issue 12105, 2020, Page(s) 169-199, ISBN 978-3-030-45720-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45721-1_7

Non-interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions (opens in new window)

Author(s): Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 442-471, ISBN 978-3-030-45726-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_15

On Instantiating the Algebraic Group Model from Falsifiable Assumptions (opens in new window)

Author(s): Thomas Agrikola, Dennis Hofheinz, Julia Kastner
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II, Issue 12106, 2020, Page(s) 96-126, ISBN 978-3-030-45723-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45724-2_4

On Pairing-Free Blind Signature Schemes in the Algebraic Group Model (opens in new window)

Author(s): Julia Kastner; Julian Loss; Jiayu Xu
Published in: Public-Key Cryptography - PKC 2022, Issue 13178, 2022, Page(s) 468-497
Publisher: Springer
DOI: 10.1007/978-3-030-97131-1_16

CoCoA: Concurrent Continuous Group Key Agreement (opens in new window)

Author(s): Joël Alwen; Benedikt Auerbach; Miguel Cueto Noval; Karen Klein; Guillermo Pascual-Perez; Krzysztof Pietrzak; Michael Walter
Published in: Advances in Cryptology - EUROCRYPT 2022, Issue 13276, 2022, Page(s) 815-844
Publisher: Springer
DOI: 10.1007/978-3-031-07085-3_28

Interactively Secure Groups from Obfuscation (opens in new window)

Author(s): Thomas Agrikola, Dennis Hofheinz
Published in: Public-Key Cryptography – PKC 2018, Issue 10770, 2018, Page(s) 341-370, ISBN 978-3-319-76580-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-76581-5_12

Graded Encoding Schemes from Obfuscation (opens in new window)

Author(s): Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia
Published in: Public-Key Cryptography – PKC 2018, Issue 10770, 2018, Page(s) 371-400, ISBN 978-3-319-76580-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-76581-5_13

New Protocols for Secure Equality Test and Comparison (opens in new window)

Author(s): Geoffroy Couteau
Published in: Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 303-320, ISBN 978-3-319-93386-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-93387-0_16

Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge (opens in new window)

Author(s): Pyrros Chaidos, Geoffroy Couteau
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10822, 2018, Page(s) 193-221, ISBN 978-3-319-78371-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-78372-7_7

On the Concrete Security of Goldreich’s Pseudorandom Generator (opens in new window)

Author(s): Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
Published in: Dynamics and Control of Industrial Cranes, 2019, Page(s) 96-124, ISBN 978-981-13-5769-5
Publisher: Springer Singapore
DOI: 10.1007/978-3-030-03329-3_4

Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings (opens in new window)

Author(s): Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 597-627, ISBN 978-3-319-96883-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96884-1_20

Dual-Mode NIZKs from Obfuscation (opens in new window)

Author(s): Dennis Hofheinz, Bogdan Ursu
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I, Issue 11921, 2019, Page(s) 311-341, ISBN 978-3-030-34577-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-34578-5_12

Designated-Verifier Pseudorandom Generators, and Their Applications (opens in new window)

Author(s): Geoffroy Couteau, Dennis Hofheinz
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 562-592, ISBN 978-3-030-17655-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_20

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More (opens in new window)

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 489-518, ISBN 978-3-030-26953-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26954-8_16

A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model (opens in new window)

Author(s): Geoffroy Couteau
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 473-503, ISBN 978-3-030-17655-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_17

Homomorphic Secret Sharing from Lattices Without FHE (opens in new window)

Author(s): Elette Boyle, Lisa Kohl, Peter Scholl
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 3-33, ISBN 978-3-030-17655-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_1

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation (opens in new window)

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 291-308, ISBN 9781-450367479
Publisher: ACM
DOI: 10.1145/3319535.3354255

Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures (opens in new window)

Author(s): Aumayr, Lukas; Ersoy, O.; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash; Tibouchi, Mehdi; Wang, Huaxiong
Published in: Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 2, Issue 13091, 2021, Page(s) 635-664
Publisher: Springer
DOI: 10.1007/978-3-030-92075-3_22

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0