


default search action
29th ASIACRYPT 2023: Guangzhou, China - Part I
- Jian Guo
, Ron Steinfeld
:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14438, Springer 2023, ISBN 978-981-99-8720-7
Secure Multi-party Computation
- Yann Disser
, Daniel Günther
, Thomas Schneider
, Maximilian Stillger, Arthur Wigandt, Hossein Yalame
:
Breaking the Size Barrier: Universal Circuits Meet Lookup Tables. 3-37 - Fuchun Lin, Chaoping Xing
, Yizhou Yao, Chen Yuan:
Amortized NISC over $\mathbb {Z}_{2^k}$ from RMFE. 38-70 - Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai:
Two-Round Concurrent 2PC from Sub-exponential LWE. 71-105 - Daniel Escudero, Cheng Hong, Hongqing Liu, Chaoping Xing
, Chen Yuan:
Degree-D Reverse Multiplication-Friendly Embeddings: Constructions and Applications. 106-138 - Estuardo Alpirez Bock
, Chris Brzuska, Pihla Karanko, Sabine Oechsner
, Kirthivaasan Puniamurthy
:
Adaptive Distributional Security for Garbling Schemes with 𝒪(|x|) Online Complexity. 139-171 - Mariana Gama
, Emad Heydari Beni
, Emmanuela Orsini
, Nigel P. Smart
, Oliver Zajonc
:
MPC with Delayed Parties over Star-Like Networks. 172-203 - Hongqing Liu, Chaoping Xing
, Yanjiang Yang, Chen Yuan:
Ramp Hyper-invertible Matrices and Their Applications to MPC Protocols. 204-236 - Xiang Liu, Ying Gao
:
Scalable Multi-party Private Set Union from Multi-query Secret-Shared Private Membership Test. 237-271 - Yi Liu
, Junzuo Lai
, Qi Wang
, Xianrui Qin
, Anjia Yang
, Jian Weng
:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. 272-301 - Hanjun Li
, Huijia Lin, Antigoni Polychroniadou, Stefano Tessaro:
LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking. 302-334 - Reo Eriguchi:
Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity. 335-368
Threshold Cryptography
- Katharina Boudgoust
, Peter Scholl
:
Simple Threshold (Fully Homomorphic) Encryption from LWE with Polynomial Modulus. 371-404 - Shahla Atapoor
, Karim Baghery
, Daniele Cozzo
, Robi Pedersen
:
VSS from Distributed ZK Proofs and Applications. 405-440 - Thibauld Feneuil
, Matthieu Rivain
:
Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head. 441-473

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.