Skip to main content

Preparing Cryptography for Modern Applications

Publications

Two-Party Adaptor Signatures from Identification Schemes

Author(s): Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi
Published in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I, Issue 12710, 2021, Page(s) 451-480
DOI: 10.1007/978-3-030-75245-3_17

Inner-Product Functional Encryption with Fine-Grained Access Control

Author(s): Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Issue 12493, 2020, Page(s) 467-497
DOI: 10.1007/978-3-030-64840-4_16

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO

Author(s): Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Issue 12110, 2020, Page(s) 187-219
DOI: 10.1007/978-3-030-45374-9_7

Impossibility Results for Lattice-Based Functional Encryption Schemes

Author(s): Akın Ünal
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I, Issue 12105, 2020, Page(s) 169-199
DOI: 10.1007/978-3-030-45721-1_7

Non-interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions

Author(s): Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 442-471
DOI: 10.1007/978-3-030-45727-3_15

On Instantiating the Algebraic Group Model from Falsifiable Assumptions

Author(s): Thomas Agrikola, Dennis Hofheinz, Julia Kastner
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II, Issue 12106, 2020, Page(s) 96-126
DOI: 10.1007/978-3-030-45724-2_4

Interactively Secure Groups from Obfuscation

Author(s): Thomas Agrikola, Dennis Hofheinz
Published in: Public-Key Cryptography – PKC 2018, Issue 10770, 2018, Page(s) 341-370
DOI: 10.1007/978-3-319-76581-5_12

Graded Encoding Schemes from Obfuscation

Author(s): Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia
Published in: Public-Key Cryptography – PKC 2018, Issue 10770, 2018, Page(s) 371-400
DOI: 10.1007/978-3-319-76581-5_13

New Protocols for Secure Equality Test and Comparison

Author(s): Geoffroy Couteau
Published in: Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 303-320
DOI: 10.1007/978-3-319-93387-0_16

Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge

Author(s): Pyrros Chaidos, Geoffroy Couteau
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10822, 2018, Page(s) 193-221
DOI: 10.1007/978-3-319-78372-7_7

On the Concrete Security of Goldreich’s Pseudorandom Generator

Author(s): Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
Published in: Dynamics and Control of Industrial Cranes, 2019, Page(s) 96-124
DOI: 10.1007/978-3-030-03329-3_4

Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings

Author(s): Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 597-627
DOI: 10.1007/978-3-319-96884-1_20

Dual-Mode NIZKs from Obfuscation

Author(s): Dennis Hofheinz, Bogdan Ursu
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I, Issue 11921, 2019, Page(s) 311-341
DOI: 10.1007/978-3-030-34578-5_12

Designated-Verifier Pseudorandom Generators, and Their Applications

Author(s): Geoffroy Couteau, Dennis Hofheinz
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 562-592
DOI: 10.1007/978-3-030-17656-3_20

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 489-518
DOI: 10.1007/978-3-030-26954-8_16

A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model

Author(s): Geoffroy Couteau
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 473-503
DOI: 10.1007/978-3-030-17656-3_17

Homomorphic Secret Sharing from Lattices Without FHE

Author(s): Elette Boyle, Lisa Kohl, Peter Scholl
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 3-33
DOI: 10.1007/978-3-030-17656-3_1

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 291-308
DOI: 10.1145/3319535.3354255