[Resource Topic] 2024/499: CCA Secure Updatable Encryption from Non-Mappable Group Actions
|
|
0
|
26
|
April 1, 2024
|
[Resource Topic] 2024/497: On the Security of Data Markets and Private Function Evaluation
|
|
0
|
25
|
April 1, 2024
|
[Resource Topic] 2024/496: Two-Round Threshold Signature from Algebraic One-More Learning with Errors
|
|
0
|
27
|
April 1, 2024
|
[Resource Topic] 2024/495: Reducing Signature Size of Matrix-code-based Signature Schemes
|
|
0
|
26
|
April 1, 2024
|
[Resource Topic] 2024/493: Reckle Trees: Updatable Merkle Batch Proofs with Applications
|
|
0
|
75
|
April 1, 2024
|
[Resource Topic] 2024/491: Updatable Policy-Compliant Signatures
|
|
0
|
32
|
March 27, 2024
|
[Resource Topic] 2024/490: One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures
|
|
0
|
39
|
March 27, 2024
|
[Resource Topic] 2024/484: Harmonizing PUFs for Forward Secure Authenticated Key Exchange with Symmetric Primitives
|
|
0
|
32
|
March 26, 2024
|
[Resource Topic] 2024/482: Single Server PIR via Homomorphic Thorp Shuffles
|
|
0
|
31
|
March 26, 2024
|
[Resource Topic] 2024/481: Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation
|
|
0
|
35
|
March 22, 2024
|
[Resource Topic] 2024/480: Folding-based zkLLM
|
|
0
|
40
|
March 22, 2024
|
[Resource Topic] 2024/479: Making Hash-based MVBA Great Again
|
|
0
|
35
|
March 22, 2024
|
[Resource Topic] 2024/474: Accumulation without Homomorphism
|
|
0
|
55
|
March 22, 2024
|
[Resource Topic] 2024/472: Sailfish: Towards Improving Latency of DAG-based BFT
|
|
0
|
39
|
March 22, 2024
|
[Resource Topic] 2024/470: Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations
|
|
0
|
31
|
March 22, 2024
|
[Resource Topic] 2024/469: Malicious Security for Sparse Private Histograms
|
|
0
|
31
|
March 22, 2024
|
[Resource Topic] 2024/467: Partially Non-Interactive Two-Round Lattice-Based Threshold Signatures
|
|
0
|
31
|
March 22, 2024
|
[Resource Topic] 2024/465: Shorter VOLEitH Signature from Multivariate Quadratic
|
|
0
|
32
|
March 22, 2024
|
[Resource Topic] 2024/456: Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction
|
|
0
|
24
|
March 22, 2024
|
[Resource Topic] 2024/453: Verifiable Information-Theoretic Function Secret Sharing
|
|
0
|
38
|
March 18, 2024
|
[Resource Topic] 2024/450: The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
|
|
0
|
42
|
March 18, 2024
|
[Resource Topic] 2024/444: A trust-minimized e-cash for cryptocurrencies
|
|
0
|
39
|
March 15, 2024
|
[Resource Topic] 2024/434: Parameter-Hiding Order-Revealing Encryption without Pairings
|
|
0
|
35
|
March 15, 2024
|
[Resource Topic] 2024/433: UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience
|
|
0
|
30
|
March 15, 2024
|
[Resource Topic] 2024/432: Perfect Asynchronous MPC with Linear Communication Overhead
|
|
0
|
43
|
March 15, 2024
|
[Resource Topic] 2024/430: SoK: Zero-Knowledge Range Proofs
|
|
0
|
35
|
March 15, 2024
|
[Resource Topic] 2024/429: FOLEAGE: $\mathbb{F}_4$OLE-Based Multi-Party Computation for Boolean Circuits
|
|
0
|
33
|
March 15, 2024
|
[Resource Topic] 2024/426: Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage
|
|
0
|
39
|
March 15, 2024
|
[Resource Topic] 2024/421: LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup
|
|
0
|
37
|
March 15, 2024
|
[Resource Topic] 2024/418: Atomic and Fair Data Exchange via Blockchain
|
|
0
|
35
|
March 11, 2024
|