default search action
41st CRYPTO 2021: Virtual Event - Part IV
- Tal Malkin, Chris Peikert:
Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16-20, 2021, Proceedings, Part IV. Lecture Notes in Computer Science 12828, Springer 2021, ISBN 978-3-030-84258-1
Zero Knowledge
- Hanwen Feng, Qiang Tang:
Witness Authenticating NIZKs and Applications. 3-33 - Xiao Liang, Omkant Pandey:
Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs. 34-64 - Thomas Attema, Ronald Cramer, Serge Fehr:
Compressing Proofs of k-Out-Of-n Partial Knowledge. 65-91 - Carsten Baum, Alex J. Malozemoff, Marc B. Rosen, Peter Scholl:
Mac'n'Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions. 92-122 - Alexander R. Block, Justin Holmgren, Alon Rosen, Ron D. Rothblum, Pratik Soni:
Time- and Space-Efficient Arguments from Groups of Unknown Order. 123-152
Encryption++
- Hoeteck Wee:
Broadcast Encryption with Size N1/3 and More from k-Lin. 155-178 - Yuyu Wang, Jiaxin Pan, Yu Chen:
Fine-Grained Secure Attribute-Based Encryption. 179-207 - Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-input Quadratic Functional Encryption from Pairings. 208-238 - Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada:
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE. 239-269 - Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. 270-300
Foundations
- Mark Zhandry:
White Box Traitor Tracing. 303-333 - Yilei Chen, Alex Lombardi, Fermi Ma, Willy Quach:
Does Fiat-Shamir Require a Cryptographic Hash Function? 334-363 - Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss:
Composition with Knowledge Assumptions. 364-393 - Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin:
Non-interactive Batch Arguments for NP from Standard Assumptions. 394-423 - Willy Quach, Brent Waters, Daniel Wichs:
Targeted Lossy Functions and Applications. 424-453 - Tianren Liu, Stefano Tessaro, Vinod Vaikuntanathan:
The t-wise Independence of Substitution-Permutation Networks. 454-483
Low-Complexity Cryptography
- Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl:
Low-Complexity Weak Pseudorandom Functions in $\mathtt {AC}0[\mathtt {MOD}2]$. 487-516 - Itai Dinur, Steven Goldfeder, Tzipora Halevi, Yuval Ishai, Mahimna Kelkar, Vivek Sharma, Greg Zaverucha:
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications. 517-547 - Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:
No Time to Hash: On Super-Efficient Entropy Accumulation. 548-576
Protocols
- Ilan Komargodski, Wei-Kai Lin:
A Logarithmic Lower Bound for Oblivious RAM (for All Parameters). 579-609 - Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi:
Oblivious RAM with Worst-Case Logarithmic Overhead. 610-640 - Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce M. Maggs:
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time. 641-669 - Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. 670-700 - Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange. 701-730
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.