


default search action
28th ASIACRYPT 2022: Taipei, Taiwan - Part IV
- Shweta Agrawal, Dongdai Lin:
Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV. Lecture Notes in Computer Science 13794, Springer 2022, ISBN 978-3-031-22971-8
Signatures
- Andreas Hülsing, Mikhail A. Kudinov
:
Recovering the Tight Security Proof of SPHINCS+. 3-33 - Julien Devevey, Omar Fawzi, Alain Passelègue, Damien Stehlé:
On Rejection Sampling in Lyubashevsky's Signature Scheme. 34-64 - Léo Ducas
, Eamonn W. Postlethwaite
, Ludo N. Pulles
, Wessel P. J. van Woerden
:
Hawk: Module LIP Makes Lattice Signatures Fast, Compact and Simple. 65-94 - Vadim Lyubashevsky, Ngoc Khanh Nguyen
:
BLOOM: Bimodal Lattice One-out-of-Many Proofs and Applications. 95-125
Commitments
- Zhelei Zhou
, Bingsheng Zhang, Hong-Sheng Zhou
, Kui Ren:
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility. 129-158 - Dario Catalano
, Dario Fiore
, Ida Tucker
:
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures. 159-188 - Matteo Campanelli
, Anca Nitulescu, Carla Ràfols
, Alexandros Zacharakis, Arantxa Zapico:
Linear-Map Vector Commitments and Their Practical Applications. 189-219 - Benoît Libert, Alain Passelègue, Mahshid Riahinia:
PointProofs, Revisited. 220-246
Theory
- Pedro Branco, Nico Döttling, Stella Wohnig:
Universal Ring Signatures in the Standard Model. 249-278 - Julia Kastner
, Julian Loss, Jiayu Xu
:
The Abe-Okamoto Partially Blind Signature Scheme Revisited. 279-309 - Cong Zhang, Hong-Sheng Zhou
, Jonathan Katz:
An Analysis of the Algebraic Group Model. 310-322 - Alice Murphy, Adam O'Neill, Mohammad Zaheri:
Instantiability of Classical Random-Oracle-Model Encryption Transforms. 323-352 - Daniel Apon, Chloé Cachet, Benjamin Fuller
, Peter Hall, Feng-Hao Liu:
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model. 353-383 - Gianluca Brian
, Sebastian Faust
, Elena Micheli, Daniele Venturi
:
Continuously Non-malleable Codes Against Bounded-Depth Tampering. 384-413 - Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz
:
Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform. 414-443
Cryptanalysis
- Antonio Flórez-Gutiérrez
:
Optimising Linear Key Recovery Attacks with Affine Walsh Transform Pruning. 447-476 - Kévin Carrier, Thomas Debris-Alazard, Charles Meyer-Hilfiger, Jean-Pierre Tillich:
Statistical Decoding 2.0: Reducing Decoding to LPN. 477-507 - Yuanyuan Zhou
, Joop van de Pol, Yu Yu
, François-Xavier Standaert
:
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. 508-536 - Jiahui He
, Kai Hu
, Bart Preneel, Meiqin Wang:
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies. 537-566
Quantum Cryptography
- Fuyuki Kitagawa, Ryo Nishimaki:
Functional Encryption with Secure Key Leasing. 569-598 - Tomoyuki Morimae, Takashi Yamakawa:
Classically Verifiable NIZK for QMA with Preprocessing. 599-627 - Jun Yan:
General Properties of Quantum Bit Commitments (Extended Abstract). 628-657

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.