Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Preparing Cryptography for Modern Applications

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Two-Party Adaptor Signatures from Identification Schemes

Author(s): Andreas Erwig, Sebastian Faust, Kristina Hostáková, Monosij Maitra, Siavash Riahi
Published in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I, Issue 12710, 2021, Page(s) 451-480, ISBN 978-3-030-75244-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-75245-3_17

Inner-Product Functional Encryption with Fine-Grained Access Control

Author(s): Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Issue 12493, 2020, Page(s) 467-497, ISBN 978-3-030-64839-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64840-4_16

Universally Composable Subversion-Resilient Cryptography

Author(s): Suvradip Chakraborty; Bernardo Magri; Jesper Buus Nielsen; Daniele Venturi
Published in: Advances in Cryptology - EUROCRYPT 2022, Issue 13275, 2022, Page(s) 272-302
Publisher: Springer
DOI: 10.1007/978-3-031-06944-4_10

Grafting Key Trees: Efficient Key Management for Overlapping Groups

Author(s): Joël Alwen; Benedikt Auerbach; Mirza Ahad Baig; Miguel Cueto Noval; Karen Klein; Guillermo Pascual-Perez; Krzysztof Pietrzak; Michael Walter
Published in: Theory of Cryptography - Proceedings of TCC 2021, Issue 13044, 2021, Page(s) 222-253
Publisher: Springer
DOI: 10.1007/978-3-030-90456-2_8

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO

Author(s): Thomas Agrikola, Geoffroy Couteau, Dennis Hofheinz
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Issue 12110, 2020, Page(s) 187-219, ISBN 978-3-030-45373-2
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45374-9_7

On Treewidth, Separators and Yao’s Garbling

Author(s): Chethan Kamath; Karen Klein; Krzysztof Pietrzak
Published in: Theory of Cryptography - TCC 2021, Issue 13043, 2021, Page(s) 486-517
Publisher: Springer
DOI: 10.1007/978-3-030-90453-1_17

The Cost of Adaptivity in Security Games on Graphs

Author(s): Chethan Kamath; Karen Klein; Krzysztof Pietrzak; Michael Walter
Published in: Theory of Cryptography - Proceedings of TCC 2021, Issue 13043, 2021, Page(s) 550-581
Publisher: Springer
DOI: 10.1007/978-3-030-90453-1_19

COA-Secure Obfuscation and Applications

Author(s): Ran Canetti; Suvradip Chakraborty; Dakshita Khurana; Nishant Kumar; Oxana Poburinnaya; Manoj Prabhakaran
Published in: Advances in Cryptology - EUROCRYPT 2022, Issue 13275, 2022, Page(s) 731-758
Publisher: Springer
DOI: 10.1007/978-3-031-06944-4_25

Towards Tight Adaptive Security of Non-Interactive Key Exchange

Author(s): Julia Hesse; Dennis Hofheinz; Lisa Kohl; Roman Langrehr
Published in: Theory of Cryptography - TCC 2021, Issue 13044, 2021, Page(s) 286-316
Publisher: Springer
DOI: 10.1007/978-3-030-90456-2_10

Impossibility Results for Lattice-Based Functional Encryption Schemes

Author(s): Akın Ünal
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I, Issue 12105, 2020, Page(s) 169-199, ISBN 978-3-030-45720-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45721-1_7

Non-interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions

Author(s): Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 442-471, ISBN 978-3-030-45726-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_15

On Instantiating the Algebraic Group Model from Falsifiable Assumptions

Author(s): Thomas Agrikola, Dennis Hofheinz, Julia Kastner
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part II, Issue 12106, 2020, Page(s) 96-126, ISBN 978-3-030-45723-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45724-2_4

On Pairing-Free Blind Signature Schemes in the Algebraic Group Model

Author(s): Julia Kastner; Julian Loss; Jiayu Xu
Published in: Public-Key Cryptography - PKC 2022, Issue 13178, 2022, Page(s) 468-497
Publisher: Springer
DOI: 10.1007/978-3-030-97131-1_16

CoCoA: Concurrent Continuous Group Key Agreement

Author(s): Joël Alwen; Benedikt Auerbach; Miguel Cueto Noval; Karen Klein; Guillermo Pascual-Perez; Krzysztof Pietrzak; Michael Walter
Published in: Advances in Cryptology - EUROCRYPT 2022, Issue 13276, 2022, Page(s) 815-844
Publisher: Springer
DOI: 10.1007/978-3-031-07085-3_28

Interactively Secure Groups from Obfuscation

Author(s): Thomas Agrikola, Dennis Hofheinz
Published in: Public-Key Cryptography – PKC 2018, Issue 10770, 2018, Page(s) 341-370, ISBN 978-3-319-76580-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-76581-5_12

Graded Encoding Schemes from Obfuscation

Author(s): Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia
Published in: Public-Key Cryptography – PKC 2018, Issue 10770, 2018, Page(s) 371-400, ISBN 978-3-319-76580-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-76581-5_13

New Protocols for Secure Equality Test and Comparison

Author(s): Geoffroy Couteau
Published in: Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 303-320, ISBN 978-3-319-93386-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-93387-0_16

Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge

Author(s): Pyrros Chaidos, Geoffroy Couteau
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10822, 2018, Page(s) 193-221, ISBN 978-3-319-78371-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-78372-7_7

On the Concrete Security of Goldreich’s Pseudorandom Generator

Author(s): Geoffroy Couteau, Aurélien Dupin, Pierrick Méaux, Mélissa Rossi, Yann Rotella
Published in: Dynamics and Control of Industrial Cranes, 2019, Page(s) 96-124, ISBN 978-981-13-5769-5
Publisher: Springer Singapore
DOI: 10.1007/978-3-030-03329-3_4

Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings

Author(s): Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 597-627, ISBN 978-3-319-96883-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96884-1_20

Dual-Mode NIZKs from Obfuscation

Author(s): Dennis Hofheinz, Bogdan Ursu
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I, Issue 11921, 2019, Page(s) 311-341, ISBN 978-3-030-34577-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-34578-5_12

Designated-Verifier Pseudorandom Generators, and Their Applications

Author(s): Geoffroy Couteau, Dennis Hofheinz
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 562-592, ISBN 978-3-030-17655-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_20

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 489-518, ISBN 978-3-030-26953-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26954-8_16

A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model

Author(s): Geoffroy Couteau
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 473-503, ISBN 978-3-030-17655-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_17

Homomorphic Secret Sharing from Lattices Without FHE

Author(s): Elette Boyle, Lisa Kohl, Peter Scholl
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II, Issue 11477, 2019, Page(s) 3-33, ISBN 978-3-030-17655-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17656-3_1

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 291-308, ISBN 9781-450367479
Publisher: ACM
DOI: 10.1145/3319535.3354255

Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures

Author(s): Aumayr, Lukas; Ersoy, O.; Erwig, Andreas; Faust, Sebastian; Hostáková, Kristina; Maffei, Matteo; Moreno-Sanchez, Pedro; Riahi, Siavash; Tibouchi, Mehdi; Wang, Huaxiong
Published in: Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 2, Issue 13091, 2021, Page(s) 635-664
Publisher: Springer
DOI: 10.1007/978-3-030-92075-3_22

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available