default search action
42nd CRYPTO 2022, Santa Barbara, CA, USA - Part IV
- Yevgeniy Dodis, Thomas Shrimpton:
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV. Lecture Notes in Computer Science 13510, Springer 2022, ISBN 978-3-031-15984-8
Secret Sharing and Secure Multiparty Computation
- Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing. 3-32 - Benny Applebaum, Eliran Kachlon, Arpita Patra:
Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority - (Extended Abstract). 33-56 - Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky:
Authenticated Garbling from Simple Correlations. 57-87
Unique Topics
- Brice Minaud, Michael Reichle:
Dynamic Local Searchable Symmetric Encryption. 91-120 - Elette Boyle, Niv Gilboa, Yuval Ishai, Victor I. Kolobov:
Programmable Distributed Point Functions. 121-151 - Yang Du, Daniel Genkin, Paul Grubbs:
Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Short Transcripts. 152-181
Symmetric Key Theory
- Charlotte Lefevre, Bart Mennink:
Tight Preimage Resistance of the Sponge Construction. 185-204 - Aldo Gunsing:
Block-Cipher-Based Tree Hashing. 205-233 - Tim Beyne, Yu Long Chen:
Provably Secure Reflection Ciphers. 234-263 - Jean Paul Degabriele, Vukasin Karadzic:
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. 264-295
Zero Knowledge
- Tiancheng Xie, Yupeng Zhang, Dawn Song:
Orion: Zero Knowledge Proof with Linear Prover Time. 299-328 - Carsten Baum, Lennart Braun, Alexander Munch-Hansen, Peter Scholl:
Moz$\mathbb {Z}_{2^k}$arella: Efficient Vector-OLE and Zero-Knowledge Proofs over $\mathbb {Z}_{2^k}$. 329-358 - Abhiram Kothapalli, Srinath T. V. Setty, Ioanna Tzialla:
Nova: Recursive Zero-Knowledge Arguments from Folding Schemes. 359-388 - Allen Kim, Xiao Liang, Omkant Pandey:
A New Approach to Efficient Non-Malleable Zero-Knowledge. 389-418
Secure Multiparty Computation III
- Damiano Abram, Ivan Damgård, Claudio Orlandi, Peter Scholl:
An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security. 421-452 - Benny Applebaum, Yuval Ishai, Or Karni, Arpita Patra:
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications. 453-482 - Vipul Goyal, Yuval Ishai, Yifan Song:
Tight Bounds on the Randomness Complexity of Secure Multiparty Computation. 483-513
Threshold Signatures
- Mihir Bellare, Elizabeth C. Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, Chenzhi Zhu:
Better than Advertised Security for Non-interactive Threshold Signatures. 517-550 - Dan Boneh, Chelsea Komlo:
Threshold Signatures with Private Accountability. 551-581
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.