


default search action
44th CRYPTO 2024, Santa Barbara, CA, USA - Part VII
- Leonid Reyzin, Douglas Stebila
:
Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part VII. Lecture Notes in Computer Science 14926, Springer 2024, ISBN 978-3-031-68393-0
Quantum Cryptography
- Prabhanjan Ananth, Amit Behera:
A Modular Approach to Unclonable Cryptography. 3-37 - Luowen Qian
:
Unconditionally Secure Quantum Commitments with Preprocessing. 38-58 - Tomoyuki Morimae, Barak Nehoran
, Takashi Yamakawa
:
Unconditionally Secure Commitments with Quantum Auxiliary Inputs. 59-92 - Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa:
Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions. 93-125 - Giulio Malavolta, Michael Walter:
Robust Quantum Public-Key Encryption with Applications to Quantum Key Distribution. 126-151 - Longcheng Li, Qian Li, Xingjian Li, Qipeng Liu:
How (not) to Build Quantum PKE in Minicrypt. 152-183 - James Bartusek, Justin Raizes:
Secret Sharing with Certified Deletion. 184-214 - Kai-Min Chung, Eli Goldin, Matthew Gray:
On Central Primitives for Quantum Cryptography with Classical Communication. 215-248
Threshold Cryptography
- Sourav Das, Ling Ren:
Adaptively Secure BLS Threshold Signatures from DDH and co-CDH. 251-284 - Jonathan Katz:
Round-Optimal, Fully Secure Distributed Key Generation. 285-316 - Dan Boneh, Aditi Partap, Lior Rotem:
Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing. 317-351 - Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, Mingyuan Wang:
Threshold Encryption with Silent Setup. 352-386 - Thomas Espitau, Shuichi Katsumata, Kaoru Takemure:
Two-Round Threshold Signature from Algebraic One-More Learning with Errors. 387-424 - Thomas Espitau, Guilhem Niot, Thomas Prest:
Flood and Submerse: Distributed Key Generation and Robust Threshold Signature from Lattices. 425-458 - Shuichi Katsumata, Michael Reichle, Kaoru Takemure:
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding. 459-491

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.