default search action
20th TCC 2022: Chicago, IL, USA - Part I
- Eike Kiltz, Vinod Vaikuntanathan:
Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13747, Springer 2022, ISBN 978-3-031-22317-4
Post-quantum Cryptography
- Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs:
Post-quantum Insecurity from LWE. 3-32 - Jelle Don, Serge Fehr, Yu-Hsuan Huang:
Adaptive Versus Static Multi-oracle Algorithms, and Quantum Security of a Split-Key PRF. 33-51 - Jeremiah Blocki, Blake Holman, Seunghoon Lee:
The Parallel Reversible Pebbling Game: Analyzing the Post-quantum Security of iMHFs. 52-79 - Russell W. F. Lai, Giulio Malavolta, Nicholas Spooner:
Quantum Rewinding for Many-Round Protocols. 80-109
Interactive Proofs
- Thomas Attema, Serge Fehr, Michael Klooß:
Fiat-Shamir Transformation of Multi-round Interactive Proofs. 113-142 - Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta:
Steganography-Free Zero-Knowledge. 143-172 - Thomas Attema, Ignacio Cascudo, Ronald Cramer, Ivan Damgård, Daniel Escudero:
Vector Commitments over Rings and Compressed $\varSigma $-Protocols. 173-202 - Anna Lysyanskaya, Leah Namisa Rosenbloom:
Universally Composable $\varSigma $-protocols in the Global Random-Oracle Model. 203-233
Quantum Cryptography
- Prabhanjan Ananth, Aditya Gulati, Luowen Qian, Henry Yuen:
Pseudorandom (Function-Like) Quantum State Generators: New Definitions and Applications. 237-265 - Navid Alamati, Giulio Malavolta, Ahmadreza Rahimi:
Candidate Trapdoor Claw-Free Functions from Group Actions with Applications to Quantum Protocols. 266-293 - Jiahui Liu, Qipeng Liu, Luowen Qian, Mark Zhandry:
Collusion Resistant Copy-Protection for Watermarkable Functionalities. 294-323
Secret-Sharing and Applications
- Divesh Aggarwal, Eldon Chung, Maciej Obremski, João Ribeiro:
On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing. 327-354 - Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye, Albert Yu:
Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family. 355-383 - Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra:
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS. 384-414
Succinct Proofs
- Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives. 417-446 - Gal Arnon, Amey Bhangale, Alessandro Chiesa, Eylon Yogev:
A Toolbox for Barriers on Interactive Oracle Proofs. 447-466 - Eli Ben-Sasson, Dan Carmon, Swastik Kopparty, David Levit:
Scalable and Transparent Proofs over All Large Fields, via Elliptic Curves - (ECFFT Part II). 467-496 - Eduardo Soria-Vazquez:
Doubly Efficient Interactive Proofs over Infinite and Non-commutative Rings. 497-525 - Rachit Garg, Kristin Sheridan, Brent Waters, David J. Wu:
Fully Succinct Batch Arguments for sfNP from Indistinguishability Obfuscation. 526-555
Identity-Based Encryption and Functional Encryption
- Mohammad Mahmoody, Wei Qi, Ahmadreza Rahimi:
Lower Bounds for the Number of Decryption Updates in Registration-Based Encryption. 559-587 - Nico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang:
IBE with Incompressible Master Secret and Small Identity Secrets. 588-617 - Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions. 618-647
Attribute-Based Encryption and Functional Encryption
- Brent Waters, Hoeteck Wee, David J. Wu:
Multi-authority ABE from Lattices Without Random Oracles. 651-679 - Hanjun Li, Huijia Lin, Ji Luo:
ABE for Circuits with Constant-Size Secret Keys and Adaptive Security. 680-710 - Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality. 711-740
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.