[Resource Topic] 2024/876: Distributing Keys and Random Secrets with Constant Complexity
|
|
0
|
48
|
June 5, 2024
|
[Resource Topic] 2024/874: Fake It till You Make It: Enhancing Security of Bluetooth Secure Connections via Deferrable Authentication
|
|
0
|
37
|
June 5, 2024
|
[Resource Topic] 2024/872: Epistle: Elastic Succinct Arguments for Plonk Constraint System
|
|
0
|
36
|
June 5, 2024
|
[Resource Topic] 2024/870: Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model
|
|
0
|
36
|
June 5, 2024
|
[Resource Topic] 2024/868: Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures
|
|
0
|
36
|
June 5, 2024
|
[Resource Topic] 2024/866: Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations
|
|
0
|
36
|
June 5, 2024
|
[Resource Topic] 2024/865: Result Pattern Hiding Boolean Searchable Encryption: Achieving Negligible False Positive Rates in Low Storage Overhead
|
|
0
|
26
|
June 5, 2024
|
[Resource Topic] 2024/864: Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation
|
|
0
|
30
|
June 5, 2024
|
[Resource Topic] 2024/859: Novel approximations of elementary functions in zero-knowledge proofs
|
|
0
|
24
|
June 5, 2024
|
[Resource Topic] 2024/854: Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk
|
|
0
|
45
|
May 31, 2024
|
[Resource Topic] 2024/850: Constant-Round Arguments for Batch-Verification and Bounded-Space Computations from One-Way Functions
|
|
0
|
48
|
May 31, 2024
|
[Resource Topic] 2024/848: How (Not) to Simulate PLONK
|
|
0
|
46
|
May 31, 2024
|
[Resource Topic] 2024/846: Distributed Asynchronous Remote Key Generation
|
|
0
|
42
|
May 31, 2024
|
[Resource Topic] 2024/842: Computation Efficient Structure Aware PSI From Incremental Function Secret Sharing
|
|
0
|
48
|
May 31, 2024
|
[Resource Topic] 2024/840: Batching-Efficient RAM using Updatable Lookup Arguments
|
|
0
|
48
|
May 31, 2024
|
[Resource Topic] 2024/839: Almost optimal succinct arguments for Boolean circuit on RAM
|
|
0
|
49
|
May 31, 2024
|
[Resource Topic] 2024/838: Verifiable Secret Sharing from Symmetric Key Cryptography with Improved Optimistic Complexity
|
|
0
|
47
|
May 31, 2024
|
[Resource Topic] 2024/837: Fully Secure MPC and zk-FLIOP Over Rings: New Constructions, Improvements and Extensions
|
|
0
|
47
|
May 31, 2024
|
[Resource Topic] 2024/829: Multi-Server Doubly Efficient PIR
|
|
0
|
38
|
May 31, 2024
|
[Resource Topic] 2024/827: Multivariate Multi-Polynomial Commitment and its Applications
|
|
0
|
42
|
May 31, 2024
|
[Resource Topic] 2024/826: Securing Lightning Channels against Rational Miners
|
|
0
|
37
|
May 31, 2024
|
[Resource Topic] 2024/823: Batched Distributed Point Function from Sparse LPN and Homomorphic Secret Sharing
|
|
0
|
85
|
May 27, 2024
|
[Resource Topic] 2024/822: Early Stopping Byzantine Agreement in $(1+\epsilon)\cdot f$ Rounds
|
|
0
|
72
|
May 27, 2024
|
[Resource Topic] 2024/820: Rate-1 Arithmetic Garbling from Homomorphic Secret-Sharing
|
|
0
|
80
|
May 27, 2024
|
[Resource Topic] 2024/818: The Brave New World of Global Generic Groups and UC-Secure Zero-Overhead SNARKs
|
|
0
|
79
|
May 27, 2024
|
[Resource Topic] 2024/814: Succinct Homomorphic Secret Sharing
|
|
0
|
78
|
May 27, 2024
|
[Resource Topic] 2024/813: How to Redact the Bitcoin Backbone Protocol
|
|
0
|
77
|
May 27, 2024
|
[Resource Topic] 2024/811: Traceable Secret Sharing Based on the Chinese Remainder Theorem
|
|
0
|
76
|
May 27, 2024
|
[Resource Topic] 2024/807: Optimal Consensus in the Presence of Overlapping Faults and Total Omission
|
|
0
|
72
|
May 27, 2024
|
[Resource Topic] 2024/799: Symmetric Signcryption and E2EE Group Messaging in Keybase
|
|
0
|
88
|
May 24, 2024
|