default search action
Search dblp for Publications
export results for "toc:db/conf/asiacrypt/asiacrypt2020-3.bht:"
@inproceedings{DBLP:conf/asiacrypt/0030KRRSW20, author = {Hao Chen and Miran Kim and Ilya P. Razenshteyn and Dragos Rotaru and Yongsoo Song and Sameer Wagh}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {31--59}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_2}, doi = {10.1007/978-3-030-64840-4\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/0030KRRSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaCGU20, author = {Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Inner-Product Functional Encryption with Fine-Grained Access Control}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {467--497}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_16}, doi = {10.1007/978-3-030-64840-4\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaCGU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbeABOR20, author = {Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Non-interactive Composition of Sigma-Protocols via Share-then-Hash}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {749--773}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_25}, doi = {10.1007/978-3-030-64840-4\_25}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbeABOR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbspoelCD0RX020, author = {Mark Abspoel and Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Matthieu Rambaud and Chaoping Xing and Chen Yuan}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Asymptotically Good Multiplicative {LSSS} over Galois Rings and Applications to {MPC} over {\textdollar}{\textbackslash}mathbb \{Z\}/pk{\textbackslash}mathbb \{Z\} {\textdollar}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {151--180}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_6}, doi = {10.1007/978-3-030-64840-4\_6}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbspoelCD0RX020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalIKNPPR20, author = {Shweta Agrawal and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran and Alon Rosen}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Cryptography from One-Way Communication: On Completeness of Finite Channels}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {653--685}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_22}, doi = {10.1007/978-3-030-64840-4\_22}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalIKNPPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalR20, author = {Shashank Agrawal and Srinivasan Raghuraman}, editor = {Shiho Moriai and Huaxiong Wang}, title = {KVaC: Key-Value Commitments for Blockchains and Beyond}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {839--869}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_28}, doi = {10.1007/978-3-030-64840-4\_28}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AnanthCG020, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Towards Efficiency-Preserving Round Compression in {MPC} - Do Fewer Rounds Mean More Computation?}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {181--212}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_7}, doi = {10.1007/978-3-030-64840-4\_7}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AnanthCG020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AttrapadungT20, author = {Nuttapong Attrapadung and Junichi Tomida}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Unbounded Dynamic Predicate Compositions in {ABE} from Standard Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {405--436}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_14}, doi = {10.1007/978-3-030-64840-4\_14}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AttrapadungT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BadrinarayananJ20, author = {Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Secure {MPC:} Laziness Leads to {GOD}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {120--150}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_5}, doi = {10.1007/978-3-030-64840-4\_5}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BadrinarayananJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BaldimtsiK0Z20, author = {Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Crowd Verifiable Zero-Knowledge and End-to-End Verifiable Multiparty Computation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {717--748}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_24}, doi = {10.1007/978-3-030-64840-4\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BaldimtsiK0Z20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BalliRV20, author = {Fatih Balli and Paul R{\"{o}}sler and Serge Vaudenay}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Determining the Core Primitive for Optimally Secure Ratcheting}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {621--650}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_21}, doi = {10.1007/978-3-030-64840-4\_21}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BalliRV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonehEKS20, author = {Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Improving Speed and Security in Updatable Encryption Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {559--589}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_19}, doi = {10.1007/978-3-030-64840-4\_19}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonehEKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoyleGIN20, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {244--276}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_9}, doi = {10.1007/978-3-030-64840-4\_9}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoyleGIN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CanettiSW20, author = {Ran Canetti and Pratik Sarkar and Xiao Wang}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {277--308}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_10}, doi = {10.1007/978-3-030-64840-4\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CanettiSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CascudoD20, author = {Ignacio Cascudo and Bernardo David}, editor = {Shiho Moriai and Huaxiong Wang}, title = {{ALBATROSS:} Publicly AttestabLe BATched Randomness Based On Secret Sharing}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {311--341}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_11}, doi = {10.1007/978-3-030-64840-4\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CascudoD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChaseGP20, author = {Melissa Chase and Esha Ghosh and Oxana Poburinnaya}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Secret-Shared Shuffle}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {342--372}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_12}, doi = {10.1007/978-3-030-64840-4\_12}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChaseGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenL020, author = {Long Chen and Yanan Li and Qiang Tang}, editor = {Shiho Moriai and Huaxiong Wang}, title = {{CCA} Updatable Encryption Against Malicious Re-encryption Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {590--620}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_20}, doi = {10.1007/978-3-030-64840-4\_20}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DalskovLS20, author = {Anders P. K. Dalskov and Eysa Lee and Eduardo Soria{-}Vazquez}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Circuit Amortization Friendly Encodingsand Their Application to Statistically Secure Multiparty Computation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {213--243}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_8}, doi = {10.1007/978-3-030-64840-4\_8}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DalskovLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Deng20, author = {Yi Deng}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Individual Simulations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {805--836}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_27}, doi = {10.1007/978-3-030-64840-4\_27}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Deng20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DuongPT20, author = {Thai Duong and Duong Hieu Phan and Ni Trieu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Catalic: Delegated {PSI} Cardinality with Applications to Contact Tracing}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {870--899}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_29}, doi = {10.1007/978-3-030-64840-4\_29}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DuongPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HeathKP20, author = {David Heath and Vladimir Kolesnikov and Stanislav Peceny}, editor = {Shiho Moriai and Huaxiong Wang}, title = {{MOTIF:} (Almost) Free Branching in {GMW} - Via Vector-Scalar Multiplication}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {3--30}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_1}, doi = {10.1007/978-3-030-64840-4\_1}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HeathKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Jiang20, author = {Yao Jiang}, editor = {Shiho Moriai and Huaxiong Wang}, title = {The Direction of Updatable Encryption Does Not Matter Much}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {529--558}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_18}, doi = {10.1007/978-3-030-64840-4\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Jiang20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KatsumataN0Y20, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Adaptively Secure Inner Product Encryption from {LWE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {375--404}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_13}, doi = {10.1007/978-3-030-64840-4\_13}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KatsumataN0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Lin020, author = {Huijia Lin and Ji Luo}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Succinct and Adaptively Secure {ABE} for {ABP} from k-Lin}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {437--466}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_15}, doi = {10.1007/978-3-030-64840-4\_15}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Lin020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LipmaaP20, author = {Helger Lipmaa and Kateryna Pavlyk}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Succinct Functional Commitment for a Large Class of Arithmetic Circuits}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {686--716}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_23}, doi = {10.1007/978-3-030-64840-4\_23}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LipmaaP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Liu-ZhangLMMT20, author = {Chen{-}Da Liu{-}Zhang and Julian Loss and Ueli Maurer and Tal Moran and Daniel Tschudi}, editor = {Shiho Moriai and Huaxiong Wang}, title = {{MPC} with Synchronous Security and Asynchronous Responsiveness}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {92--119}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_4}, doi = {10.1007/978-3-030-64840-4\_4}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Liu-ZhangLMMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PatraRS20, author = {Arpita Patra and Divya Ravi and Swati Singla}, editor = {Shiho Moriai and Huaxiong Wang}, title = {On the Exact Round Complexity of Best-of-Both-Worlds Multi-party Computation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {60--91}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_3}, doi = {10.1007/978-3-030-64840-4\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/PatraRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Tan020, author = {Syh{-}Yuan Tan and Thomas Gro{\ss}}, editor = {Shiho Moriai and Huaxiong Wang}, title = {MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {498--526}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_17}, doi = {10.1007/978-3-030-64840-4\_17}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Tan020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/TowaV20, author = {Patrick Towa and Damien Vergnaud}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Succinct Diophantine-Satisfiability Arguments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {774--804}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_26}, doi = {10.1007/978-3-030-64840-4\_26}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/TowaV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2020-3, editor = {Shiho Moriai and Huaxiong Wang}, title = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4}, doi = {10.1007/978-3-030-64840-4}, isbn = {978-3-030-64839-8}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2020-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.