default search action
26th ASIACRYPT 2020: Daejeon, South Korea - Part III
- Shiho Moriai, Huaxiong Wang:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12493, Springer 2020, ISBN 978-3-030-64839-8
Multi-party Computation
- David Heath, Vladimir Kolesnikov, Stanislav Peceny:
MOTIF: (Almost) Free Branching in GMW - Via Vector-Scalar Multiplication. 3-30 - Hao Chen, Miran Kim, Ilya P. Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh:
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning. 31-59 - Arpita Patra, Divya Ravi, Swati Singla:
On the Exact Round Complexity of Best-of-Both-Worlds Multi-party Computation. 60-91 - Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi:
MPC with Synchronous Security and Asynchronous Responsiveness. 92-119 - Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
Secure MPC: Laziness Leads to GOD. 120-150 - Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, Matthieu Rambaud, Chaoping Xing, Chen Yuan:
Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over $\mathbb {Z}/p^k\mathbb {Z} $. 151-180 - Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain:
Towards Efficiency-Preserving Round Compression in MPC - Do Fewer Rounds Mean More Computation? 181-212 - Anders P. K. Dalskov, Eysa Lee, Eduardo Soria-Vazquez:
Circuit Amortization Friendly Encodingsand Their Application to Statistically Secure Multiparty Computation. 213-243 - Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof:
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs. 244-276 - Ran Canetti, Pratik Sarkar, Xiao Wang:
Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security. 277-308
Secret Sharing
- Ignacio Cascudo, Bernardo David:
ALBATROSS: Publicly AttestabLe BATched Randomness Based On Secret Sharing. 311-341 - Melissa Chase, Esha Ghosh, Oxana Poburinnaya:
Secret-Shared Shuffle. 342-372
Attribute-Based Encryption
- Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Inner Product Encryption from LWE. 375-404 - Nuttapong Attrapadung, Junichi Tomida:
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions. 405-436 - Huijia Lin, Ji Luo:
Succinct and Adaptively Secure ABE for ABP from k-Lin. 437-466 - Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu:
Inner-Product Functional Encryption with Fine-Grained Access Control. 467-497 - Syh-Yuan Tan, Thomas Groß:
MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System. 498-526
Updatable Encryption
- Yao Jiang:
The Direction of Updatable Encryption Does Not Matter Much. 529-558 - Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih:
Improving Speed and Security in Updatable Encryption Schemes. 559-589 - Long Chen, Yanan Li, Qiang Tang:
CCA Updatable Encryption Against Malicious Re-encryption Attacks. 590-620 - Fatih Balli, Paul Rösler, Serge Vaudenay:
Determining the Core Primitive for Optimally Secure Ratcheting. 621-650
Zero Knowledge
- Shweta Agrawal, Yuval Ishai, Eyal Kushilevitz, Varun Narayanan, Manoj Prabhakaran, Vinod M. Prabhakaran, Alon Rosen:
Cryptography from One-Way Communication: On Completeness of Finite Channels. 653-685 - Helger Lipmaa, Kateryna Pavlyk:
Succinct Functional Commitment for a Large Class of Arithmetic Circuits. 686-716 - Foteini Baldimtsi, Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:
Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation. 717-748 - Masayuki Abe, Miguel Ambrona, Andrej Bogdanov, Miyako Ohkubo, Alon Rosen:
Non-interactive Composition of Sigma-Protocols via Share-then-Hash. 749-773 - Patrick Towa, Damien Vergnaud:
Succinct Diophantine-Satisfiability Arguments. 774-804 - Yi Deng:
Individual Simulations. 805-836
Blockchains and Contact Tracing
- Shashank Agrawal, Srinivasan Raghuraman:
KVaC: Key-Value Commitments for Blockchains and Beyond. 839-869 - Thai Duong, Duong Hieu Phan, Ni Trieu:
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. 870-899
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.