


default search action
26th PKC 2023: Atlanta, GA, USA - Part II
- Alexandra Boldyreva, Vladimir Kolesnikov
:
Public-Key Cryptography - PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part II. Lecture Notes in Computer Science 13941, Springer 2023, ISBN 978-3-031-31370-7
Homomorphic Cryptography and Other Topics
- Thomas Attema
, Pedro Capitão, Lisa Kohl:
On Homomorphic Secret Sharing from Polynomial-Modulus LWE. 3-32 - KangHoon Lee, Ji Won Yoon:
Discretization Error Reduction for High Precision Torus Fully Homomorphic Encryption. 33-62 - Giuseppe Ateniese, Long Chen, Danilo Francati
, Dimitrios Papadopoulos, Qiang Tang
:
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting). 63-93 - Markus Krausz
, Georg Land
, Jan Richter-Brockmann
, Tim Güneysu:
A Holistic Approach Towards Side-Channel Secure Fixed-Weight Polynomial Sampling. 94-124
MPC
- Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Wenxuan Wu, Yupeng Zhang:
Private Polynomial Commitments and Applications to MPC. 127-158 - Sanjam Garg, Mohammad Hajiabadi, Abhishek Jain, Zhengzhong Jin, Omkant Pandey, Sina Shiehian:
Credibility in Private Set Membership. 159-189 - Dung Bui, Geoffroy Couteau:
Improved Private Set Intersection for Sets with Small Entries. 190-220 - Geoffroy Couteau, Clément Ducros
:
Pseudorandom Correlation Functions from Variable-Density LPN, Revisited. 221-250 - Satrajit Ghosh, Mark Simkin:
Threshold Private Set Intersection with Better Communication Complexity. 251-272
Encryption
- Antonio Faonio, Dennis Hofheinz, Luigi Russo
:
Almost Tightly-Secure Re-randomizable and Replayable CCA-Secure Public Key Encryption. 275-305 - Miguel Ambrona, Romain Gay:
Multi-authority ABE for Non-monotonic Access Structures. 306-335 - Carlo Brunetta
, Hans Heum
, Martijn Stam
:
Multi-instance Secure Public-Key Encryption. 336-367 - Peihan Miao, Sikhar Patranabis, Gaven J. Watson:
Unidirectional Updatable Encryption and Proxy Re-encryption from DDH. 368-398 - Yao Jiang Galteland
, Jiaxin Pan
:
Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption. 399-428 - Geng Wang, Shi-Feng Sun, Zhedong Wang, Dawu Gu:
Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications. 429-458
ZK I
- Pierre-Alain Fouque
, Adela Georgescu
, Chen Qian
, Adeline Roux-Langlois
, Weiqiang Wen
:
A Generic Transform from Multi-round Interactive Proof to NIZK. 461-481 - Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
Fine-Grained Verifier NIZK and Its Applications. 482-511 - Dimitris Kolonelos, Mary Maller, Mikhail Volkhov:
Zero-Knowledge Arguments for Subverted RSA Groups. 512-541 - Arasu Arun, Chaya Ganesh, Satya V. Lokam, Tushar Mopuri, Sriram Sridhar
:
Dew: A Transparent Constant-Sized Polynomial Commitment Scheme. 542-571
IO and ZK II
- Riddhi Ghosal, Amit Sahai, Brent Waters:
Non-Interactive Publicly-Verifiable Delegation of Committed Programs. 575-605 - Nico Döttling, Phillip Gajland, Giulio Malavolta
:
Laconic Function Evaluation for Turing Machines. 606-634 - Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
A Map of Witness Maps: New Definitions and Connections. 635-662 - Matteo Campanelli
, Danilo Francati
, Claudio Orlandi:
Structure-Preserving Compilers from New Notions of Obfuscations. 663-693

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.