


default search action
29th ASIACRYPT 2023: Guangzhou, China - Part II
- Jian Guo
, Ron Steinfeld
:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14439, Springer 2023, ISBN 978-981-99-8723-8
Proof Systems - Succinctness and Foundations
- Alexander R. Block
, Albert Garreta, Jonathan Katz
, Justin Thaler, Pratyush Ranjan Tiwari, Michal Zajac:
Fiat-Shamir Security of FRI and Related SNARKs. 3-40 - Helger Lipmaa
:
On Black-Box Knowledge-Sound Commit-And-Prove SNARKs. 41-76 - Benedikt Bünz
, Binyi Chen
:
Protostar: Generic Efficient Accumulation/Folding for Special-Sound Protocols. 77-110 - Yuncong Zhang
, Shifeng Sun
, Ren Zhang
, Dawu Gu
:
Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines. 111-141 - Dakshita Khurana, Giulio Malavolta, Kabir Tomer:
Weak Zero-Knowledge via the Goldreich-Levin Theorem. 142-173 - Yuyu Wang
, Chuanjie Su
, Jiaxin Pan
, Yu Chen
:
A Simple and Efficient Framework of Proof Systems for NP. 174-207 - Min Zhang
, Yu Chen
, Chuanzhou Yao, Zhichao Wang
:
Sigma Protocols from Verifiable Secret Sharing and Their Applications. 208-242
Anonymity
- Fabrice Benhamouda, Mariana Raykova, Karn Seth:
Anonymous Counting Tokens. 245-278 - Tian Qiu, Qiang Tang:
Predicate Aggregate Signatures and Applications. 279-312 - Khoa Nguyen
, Partha Sarathi Roy
, Willy Susilo
, Yanhong Xu
:
Bicameral and Auditably Private Signatures. 313-347 - Elizabeth C. Crites
, Markulf Kohlweiss
, Bart Preneel
, Mahdi Sedaghat
, Daniel Slamanig
:
Threshold Structure-Preserving Signatures. 348-382 - Shuichi Katsumata, Michael Reichle, Yusuke Sakai:
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions. 383-417 - Johannes Blömer
, Jan Bobolz
, Laurens Porzenheim
:
A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices. 418-452 - Valerie Fetzer
, Michael Klooß
, Jörn Müller-Quade, Markus Raiber
, Andy Rupp
:
Universally Composable Auditable Surveillance. 453-487

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.