Accepted Papers 已接受的论文
These papers are listed in order of submission.
这些论文按提交顺序排列。
-
Twinkle: Threshold Signatures from DDH with Full Adaptive Security
闪烁:具有完全自适应安全性的DDH阈值签名Renas Bacho, Julian Loss, Stefano Tessaro, Benedikt Wagner, Chenzhi Zhu
Renas Bacho、Julian Loss、Stefano Tessaro、Benedikt Wagner、Chen Zhi Zhu
CISPA Helmholtz Center for Information Security, Saarland University, CISPA Helmholtz Center for Information Security, University of Washington
CISPA亥姆霍兹信息安全中心,萨尔大学,CISPA亥姆霍兹信息安全中心,华盛顿大学 -
Efficient Arithmetic in Garbled Circuits
Garbled电路中的有效算法David Heath
University of Illinois Urbana-Champaign
伊利诺伊香槟分校 -
M&M'S: Mix and Match Attacks on Schnorr-type Blind Signatures with Repetition
M&M:对具有重复的Schnorr型盲签名的混合匹配攻击Khue Do, Lucjan Hanzlik, Eugenio Paracucchi
Khue Do、Lucjan Hanzlik、Eugenio Paracucchi
CISPA Helmholtz Center for Information Security
CISPA亥姆霍兹信息安全中心 -
Toothpicks: More Efficient Fork-Free Two-Round Multi-Signatures
牙签:更高效的无叉两轮多重签名Jiaxin Pan, Benedikt Wagner
潘嘉欣,瓦格纳
University of Kassel, Germany, CISPA Helmholtz Center for Information Security, Saarland University
德国卡塞尔大学,CISPA亥姆霍兹信息安全中心,萨尔大学 -
The Exact Multi-User Security of (Tweakable) Key Alternating Ciphers with a Single Permutation
具有单次置换的(可调)密钥交替密码的精确多用户安全性Yusuke Naito, Yu Sasaki, Takeshi Sugawara
内藤佑介、佐佐木由纪、杉原武
Mitsubishi Electric Corporation, NTT Social Informatics Laboratories, The University of Electro-Communications
三菱电机公司、NTT社会信息学实验室、电气通信大学 -
A Holistic Security Analysis of Monero Transactions
Monero交易的整体安全性分析Cas Cremers, Julian Loss, Benedikt Wagner
Cas Cremers、Julian Loss、Benedikt Wagner
CISPA Helmholtz Center for Information Security, CISPA Helmholtz Center for Information Security, Saarland University
CISPA亥姆霍兹信息安全中心 -
Anamorphic Encryption, Revisited
变形加密,再谈Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer, Guilherme Rito
法比奥·班菲、康斯坦丁·格吉尔、马丁·希尔特、尤里·毛雷尔、吉列尔梅·里托
Zühlke Engineering AG, ETH Zurich, Ruhr-Universität Bochum
苏黎世联邦理工学院Zühlke Engineering AG,波鸿鲁尔大学 -
Can Alice and Bob Guarantee Output to Carol?
Alice和Bob能保证输出给Carol吗?Bar Alon, Eran Omri, Muthuramakrishnan Venkitasubramaniam
Bar-Alon,EranOmri,MuthuramakrishnanVenkitasubramaniam,
Ben Gurion University, Ariel University, Georgetown University
本古里安大学、阿里尔大学、乔治敦大学 -
SPRINT: High-Throughput Robust Distributed Schnorr Signatures
SPRINT:高吞吐量鲁棒分布式Schnorr签名Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, Tal Rabin
Fabrice Benhamouda、Shai Halevi、Hugo Krawczyk、Yiping Ma、Tal Rabin
Amazon Web Services, University of Pennsylvania, Amazon Web Services and University of Pennsylvania
亚马逊网络服务、宾夕法尼亚大学、亚马逊网络服务和宾夕法尼亚大学 -
The supersingular Endomorphism Ring and One Endomorphism problems are equivalent
超奇异自同态环与一个自同态问题是等价的Aurel Page, Benjamin Wesolowski
Aurel Page,Benjamin Wesolowski
Univ. Bordeaux, CNRS, INRIA, Bordeaux INP, IMB, UMR 5251, F-33400 Talence, France, ENS de Lyon, CNRS, UMPA, UMR 5669, Lyon, France
波尔多大学,CNRS,INRIA,波尔多INP,IMB,UMR 5251,F-33400 Talence,France,ENS de Lyon,CNRS、UMPA,UMR 5669,Lyon,France -
Trapdoor Memory-Hard Functions
活门记忆硬功能Christoph U. Günther, Benedikt Auerbach, Krzysztof Pietrzak
Christoph U.Günther、Benedikt Auerbach、Krzysztof Pietrzak
Institute of Science and Technology Austria
奥地利科学技术研究所 -
AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing
AprèsSQI:使用扩展字段签名的SQIsign超快速验证Maria Corte-Real Santos, Jonathan Komada Eriksen, Michael Meyer, Krijn Reijnders
Maria Corte Real Santos、Jonathan Komada Eriksen、Michael Meyer、Krijn Reijnders
University College London, NTNU, University of Regensburg, Radboud University Nijmegen
伦敦大学学院、NTNU、雷根斯堡大学、奈梅亨拉德布大学 -
Probabilistically Checkable Arguments for all NP
所有NP的概率可检验自变量Shany Ben-David Shany Ben David
Bar-Ilan University 巴宜兰大学 -
Partial Sums Meet FFT: Improved Attack on 6-Round AES
部分和满足FFT:改进的6轮AES攻击Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaetan Leurent, Avichai Marmor, Victor Mollimard
Orr Dunkelman、Shibam Ghosh、Nathan Keller、Gaetan Leurent、Avichai Marmor、Victor Mollimard
University of Haifa, Bar Ilan University, Inria, Paris
海法大学、巴伊兰大学、巴黎因里亚 -
Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model
量子随机预言机模型中晶体二锂的安全性评价Kelsey A. Jackson, Carl A. Miller, Daochen Wang
Kelsey A.Jackson、Carl A.Miller、Daochen Wang
University of Maryland, University of Maryland, NIST -
Algorithms for matrix code and alternating trilinear form equivalences via new isomorphism invariants
基于新同构不变量的矩阵编码和交替三线性形式等价算法Anand Kumar Narayanan, Youming Qiao, Gang Tang
阿南德·库马尔·纳拉亚南、乔友明、唐刚
SandboxAQ, University of Technology Sydney
SandboxAQ,悉尼科技大学 -
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search
在私有信息检索和更高级的数据库搜索中实现主动安全的高效通用方法Reo Eriguchi, Kaoru Kurosawa, Koji Nuida
Eriguchi,Kaoru Kurosawa,Koji Nuida
National Institute of Advanced Industrial Science and Technology (AIST), Chuo University/AIST, Kyushu University/AIST
国立先进工业科学技术研究所(AIST)、中央大学/AIST、九州大学/AIST -
New Records in Collision Attacks on SHA-2
SHA-2碰撞攻击的新记录Yingxin Li, Fukang Liu, Gaoli Wang
李迎新、刘福康、王高丽
East China Normal University, Tokyo Institute of Technology
华东师范大学东京工业大学 -
Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output
具有保证输出的常圆模拟安全抛硬币扩展Damiano Abram, Jack Doerner, Yuval Ishai, Varun Narayanan
Damiano Abram、Jack Doerner、Yuval Ishai、Varun Narayanan
Aarhus University, Technion and Reichman U, Technion, University of California, LA
奥胡斯理工大学和赖克曼理工大学 -
Generalized Feistel Ciphers for Efficient Prime Field Masking
广义Feistel密码在素数域屏蔽中的应用Lorenzo Grassi, Loïc Masure, Pierrick Méaux, Thorben Moos, François-Xavier Standaert
Lorenzo Grassi、Loïc Masure、Pierrick Méaux、Thorben Moos、François Xavier Standaert
Ruhr University Bochum (Germany), Université de Montpellier, CNRS, LIRMM (France), University of Luxembourg (Luxembourg), Université catholique de Louvain (Belgium)
波鸿鲁尔大学(德国)、蒙彼利埃大学、CNRS、LIRMM(法国)、卢森堡大学(卢森堡)、卢万天主教大学(比利时) -
Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and TFHE
Torus上的加密暗物质:来自浅层重频和TFHE的遗忘重频Martin R. Albrecht, Alex Davidson, Amit Deo, Daniel Gardham
Martin R.Albrecht、Alex Davidson、Amit Deo、Daniel Gardham
King’s College London and SandboxAQ, NOVA LINCS & DI, FCT, Universidade NOVA de Lisboa, Zama and Crypto Quantique, University of Surrey
伦敦国王学院和SandboxAQ、NOVA LINCS&DI、FCT、里斯本NOVA大学、扎马和萨里大学Crypto Quantique -
Practical Attack on All Parameters of the DME Signature Scheme
DME签名方案所有参数的实用攻击Pierre Briaud, Maxime Bros, Ray Perlner, Daniel Smith-Tone
Pierre Briaud、Maxime Bros、Ray Perlner、Daniel Smith Tone
Inria Paris & Sorbonne Université, NIST, NIST & University of Louisville
Inria巴黎和索邦大学、NIST、NIST和路易斯维尔大学 -
Signatures with Memory-Tight Security in the Quantum Random Oracle Model
量子随机Oracle模型中具有内存紧安全性的签名Keita Xagawa 泽川敬太
Technology Innovation Institute
技术创新研究所 -
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation
通过密钥确认进行严格(完全)前向保密的密钥交换Jiaxin Pan, Doreen Riepel, Runzhi Zeng
潘佳欣、Doreen Riepel、曾润芝
University of Kassel, Germany, UC San Diego, USA, NTNU, Norway
德国卡塞尔大学、美国加州大学圣地亚哥分校、挪威国立大学 -
The Complexity of Algebraic Algorithms for LWE
LWE代数算法的复杂性Matthias Johann Steiner
Alpen-Adria-Universität Klagenfurt
克拉根福Alpen Adria大学 -
Anamorphic Encryption: New Constructions and Homomorphic Realizations
同态加密:新构造与同态实现Dario Catalano, Emanuele Giunta, Francesco Migliaro
Dario Catalano、Emanuele Giunta、Francesco Migliaro
Università di Catania, IMDEA Software Institute -
SQIsignHD: New Dimensions in Cryptography
Pierrick Dartois, Antonin Leroux, Damien Robert, Benjamin Wesolowski
INRIA, IMB, UMR 5251, F-33400, Talence, France, DGA-MI, Bruz, France, ENS de Lyon, CNRS, UMPA, UMR 5669, Lyon, France -
Witness Semantic Security
Paul Lou, Nathan Manohar, Amit Sahai
UCLA, IBM T.J. Watson Research Center -
Fully Homomorphic Encryption beyond IND-CCA1 Security: Integrity through Verifiability
Mark Manulis, Jérôme Nguyen
Universität der Bundeswehr, Munich -
Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts
David Heath, Vladimir Kolesnikov, Lucien K. L. Ng
University of Illinois Urbana-Champaign, Georgia Institute of Technology -
Pauli Manipulation Detection Codes and Applications to Quantum Communication over Adversarial Channels
Thiago Bergamaschi
UC Berkeley -
Publicly Verifiable Secret Sharing over Class Groups and Applications to DKG and YOSO
Ignacio Cascudo, Bernardo David
IMDEA Software Institute, ITU Copenhagen -
Bulletproofs++: Next Generation Confidential Transactions via Reciprocal Set Membership Arguments
Liam Eagen, Sanket Kanjalkar, Jonas Nick, Tim Ruffing
Blockstream Research -
Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
Taiga Hiroka, Fuyuki Kitagawa, Tomoyuki Morimae, Ryo Nishimaki, Tapas Pal, Takashi Yamakawa
Kyoto University, NTT Social Informatics Laboratories -
A Novel Framework for Explainable Leakage Assessment
Si Gao, Elisabeth Oswald
University of Klagenfurt, University of Klagenfurt and University of Birmingham -
Polynomial Time Cryptanalytic Extraction of Neural Network Models
Isaac Canales-Martínez, Jorge Chávez-Saab, Anna Hambitzer, Francisco Rodríguez-Henríquez, Nitin Satpute, Adi Shamir
Technology Innovation Institute, Weizmann Institute -
Perfect Asynchronous MPC with Linear Communication Overhead
Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra
Intel Labs, Bar Ilan University, Indian Institute of Science, Bangalore, Indian Institute of Science Bangalore -
SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions
Martin R. Albrecht, Giacomo Fenzi, Oleksandra Lapiha, Ngoc Khanh Nguyen
King's College London and SandboxAQ, EPFL, Royal Holloway University of London -
Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS
Gilad Asharov, Anirudh Chandramouli
Bar-Ilan University 巴宜兰大学 -
Improving Key Recovery Linear Attacks with Walsh Spectrum Puncturing
Antonio Flórez-Gutiérrez, Yosuke Todo
NTT Social Informatics Laboratories
NTT社会信息学实验室 -
Universal Composable Password Authenticated Key Exchange for the Post-Quantum World
You Lyu, Shengli Liu, Shuai Han
Shanghai Jiao Tong University
上海交通大学 -
Early Stopping for Any Number of Corruptions
Julian Loss, Jesper Buus Nielsen
CISPA Helmholtz Center for Information Security, Aarhus University -
Fuzzy Private Set Intersection with Large Hyperballs
Aron van Baarsen, Sihang Pu
CWI, CISPA Helmholtz Center for Information Security -
Bootstrapping Bits with CKKS
Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, Damien Stehlé
CryptoLab Inc., CryptoLab Inc. / Seoul National University -
Asymptotics and Improvements of Sieving for Codes
Leo Ducas, Simona Etinski, Andre Esser, Elena Kirshanova
CWI, Leiden University, CWI, Technology Innovation Institute -
A generic algorithm for efficient key recovery in differential attacks – and its associated tool
Christina Boura, Nicolas David, Patrick Derbez, Rachelle Heim Boissier, María Naya-Plasencia
University of Versailles, France, Inria, France, Univ Rennes, Inria, CNRS, IRISA, France -
Concurrently Secure Blind Schnorr Signatures
Georg Fuchsbauer, Mathias Wolf
TU Wien -
Fast batched asynchronous distributed key generation
Victor Shoup, Jens Groth
DFINITY -
The NISQ Complexity of Collision Finding
Yassine Hamoudi, Qipeng Liu, Makrand Sinha
Université de Bordeaux, CNRS, LaBRI, University of California at San Diego, University of Illinois at Urbana-Champaign -
Non-malleable codes with optimal rate for poly-size circuits
Marshall Ball, Ronen Shaltiel, Jad Silbak
New York University, University of Haifa, Tel Aviv University -
Foundations of Adaptor Signatures
Paul Gerhart, Dominique Schröder, Pratik Soni, Sri Aravinda Krishnan Thyagarajan
Friedrich-Alexander-Universität Erlangen-Nürnberg, University of Utah, NTT Research -
Approximate Lower Bound Arguments
Pyrros Chaidos, Aggelos Kiayias, Leonid Reyzin, Anatoliy Zinovyev
National & Kapodistrian University of Athens, IOG, University of Edinburgh and IOG, Boston University -
Isogeny problems with level structure
Luca De Feo, Tako Boris Fouotsa, Lorenz Panny
IBM Research Europe, EPFL, Switzerland, TU München, Germany -
Toward Malicious Constant-Rate 2PC via Arithmetic Garbling
Carmit Hazay, Yibin Yang
Bar-Ilan University, Georgia Institute of Technology -
Software with Certified Deletion
James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, Bhaskar Roberts
UC Berkeley, CMU and NTT Research, UIUC, Bocconi University and Max Planck Institute for Security and Privacy, CMU -
Tight Security of TNT and Beyond: Attacks, Proofs and Possibilities for the Cascaded LRW Paradigm
Ashwin Jha, Mustafa Khairallah, Mridul Nandi, Abishanka Saha
Ruhr-Universität Bochum, Bochum, Germany, CISPA Helmholtz Center for Information Security, Saarbrücken, Germany, Seagate Research Group, Singapore, Singapore, Lund University, Lund, Sweden, Indian Statistical Institute, Kolkata, India, Indian Statistical Institute , Kolkata, India -
Public-Coin, Complexity-Preserving, Succinct Arguments of Knowledge for NP from Collision-Resistance
Cody Freitag, Omer Paneth, Rafael Pass
Northeastern University and Boston University, Tel Aviv University, Tel Aviv University and Cornell Tech -
Closing the Efficiency Gap between Synchronous and Network-Agnostic Consensus
Giovanni Deligios, Mose Mizrahi Erbes
ETH Zurich 苏黎世联邦理工学院 -
Key Recovery Attack on the Partial Vandermonde Knapsack Problem
Dipayan Das, Antoine Joux
NTT Social Informatics Laboratories, CISPA Helmholtz Center for Information Security -
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation
Fangqi Dong, Zihan Hao, Ethan Mook, Daniel Wichs
IIIS, Tsinghua University, Northeastern University, Northeastern University and NTT Research -
Jolt: SNARKs for Virtual Machines via Lookups
Arasu Arun, Srinath Setty, Justin Thaler
New York University, Microsoft Research, a16z crypto and Georgetown University -
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions
Helger Lipmaa, Roberto Parisella, Janno Siim
University of Tartu, Simula UiB -
Lower-Bounds on Public-Key Operations in PIR
Jesko Dujmovic, Mohammad Hajiabadi
CISPA Helmholtz Center for Information Security, University of Waterloo -
Fast Public-Key Silent OT and More from Constrained Naor-Reingold
Dung Bui, Geoffroy Couteau, Pierre Meyer, Alain Passelègue, Mahshid Riahinia
Université Paris Cité, IRIF, Université Paris Cité, CNRS, IRIF, Aarhus Universitet, CryptoLab, ENS de Lyon, Laboratoire LIP (U. Lyon, CNRS, ENSL, Inria, UCBL) -
Unbiasable Verifiable Random Functions
Emanuele Giunta, Alistair Stewart
Web3 Foundation -
Monotone-Policy Aggregate Signatures
Maya Farber Brodsky, Arka Rai Choudhuri, Abhishek Jain, Omer Paneth
Tel Aviv University, NTT Research, NTT Research and Johns Hopkins University -
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions
阈值浣熊:来自标准格假设的实用阈值签名Shuichi Katsumata, Mary Maller, Rafael del Pino, Fabrice Mouhartem, Thomas Prest, Markku-Juhani Saarinen
Katsumata水池、Mary Maller、Rafael del Pino、Fabrice Mouhartem、Thomas Prest、Markku Juhani Saarinen
PQShield LTD & AIST, PQShield LTD & Ethereum Foundation, PQShield SAS, XWiki SAS (CryptPad), PQShield LTD & Tampere University -
Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort
Kai-Min Chung, Mi-Ying Huang, Er-Cheng Tang, Jiapeng Zhang
Academia Sinica, University of Southern California, University of Washington -
Lower Bounds for Lattice-based Compact Functional Encryption
Erkan Tairi, Akin Ünal
DIENS, École normale supérieure, CNRS, Inria, PSL University, Paris, France, ISTA, Klosterneuburg, Austria -
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis
Itai Dinur
Ben-Gurion University -
Cryptanalysis of rank-2 module-LIP in totally real number fields
Guilhem Mureau, Alice Pellet-Mary, Georges Pliatsok, Alexandre Wallet
Inria, Univ. Bordeaux, CNRS, Univ. Bordeaux, Inria, Univ Rennes, Irisa, CNRS, France -
Provable Dual Attacks on Learning with Errors
Amaury Pouly, Yixin Shen
French National Centre for Scientific Research (CNRS), Paris, France, King's College London, London, Uk -
Improved Differential Meet-In-The-Middle Cryptanalysis
Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia
Department of Electrical Engineering, Shahid Beheshti University, Tehran, Iran, INRIA Paris -
Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions
Aggelos Kiayias, Nikos Leonardos, Yu Shen
University of Edinburgh and IOG, National and Kapodistrian University of Athens, University of Edinburgh -
The Hardness of LPN over Any Integer Ring and Field for PCG Applications
Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu
Shanghai Jiao Tong University, Shanghai Qi Zhi Institute, Northwestern University, State Key Laboratory of Cryptology -
Post-Quantum security of Tweakable Even-Mansour, and Applications
Gorjan Alagic, Chen Bai, Jonathan Katz, Christian Majenz, Patrick Struck
University of Maryland, NIST, University of Maryland, Google, Technical University of Denmark, University of Konstanz -
Unlocking the lookup singularity with Lasso
Srinath Setty, Justin Thaler, Riad Wahby
Microsoft Research, a16z crypto research and Georgetown University, CMU -
Succinct Functional Commitments for Circuits from k-Lin
Hoeteck Wee, David J. Wu
NTT Research and ENS, Paris, UT Austin -
Efficient Pre-processing PIR Without Public-Key Cryptography
Mingxun Zhou, Ashrujit Ghoshal, Elaine Shi
CMU -
Time-Lock Puzzles with Efficient Batch Solving
Jesko Dujmovic, Rachit Garg, Giulio Malavolta
CISPA Helmholtz Center for Information Security, UT Austin, Bocconi University & Max Planck Institute for Security and Privacy -
Leakage-Tolerant Circuits
Yuval Ishai, Yifan Song
Technion, Tsinghua University and Shanghai Qi Zhi Institute -
Circuit Bootstrapping: Faster and Smaller
Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, Kunpeng Wang
Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing, China -
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond
Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng
College of Cyber Security, Jinan University, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering -
Pseudorandom Isometries 伪随机异构体
Prabhanjan Ananth, Aditya Gulati, Fatih Kaleoglu, Yao-Ting Lin
UCSB -
Strong Batching for Non-Interactive Statistical Zero-Knowledge
非交互式统计零知识的强批处理Prashant Nalini Vasudevan, Ron D. Rothblum, Shafik Nassar, Changrui Mu
Prashant Nalini Vasudevan、Ron D.Rothblum、Shafik Nassar、Changrui Mu
National University of Singapore, Technion, The University of Texas at Austin
新加坡国立大学,Technion,得克萨斯大学奥斯汀分校 -
New Limits of Provable Security and Applications to ElGamal Encryption
Sven Schäge
Eindhoven University of Technology -
Asymptotically Optimal Message Dissemination with Applications to Blockchains
Chen-Da Liu-Zhang, Christian Matt, Søren Eller Thomsen
HSLU and Web3 Foundation, Concordium, The Alexandra Institute -
Constructing Leakage-resilient Shamir's Secret Sharing: Over Composite Order Fields
Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Xiuyu Ye
Purdue University, ETH Zurich, Ariel University -
Massive Superpoly Recovery with a Meet-in-the-middle Framework -- Improved Cube Attacks on Trivium and Kreyvium
Jiahui He, Kai Hu, Meiqin Wang, Hao Lei
Shandong University, Nanyang Technological University -
Integrating Causality in Messaging Channels
Shan Chen, Marc Fischlin
Southern University of Science and Technology, TU Darmstadt -
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate
Pedro Branco, Nico Döttling, Akshayaram Srinivasan
Max Planck Institute for Security and Privacy, CISPA, University of Toronto -
Connecting Leakage-Resilient Secret Sharing to Practice: Scaling Trends and Physical Dependencies of Prime Field Masking
Sebastian Faust, Loïc Masure, Elena Micheli, Maximilian Orlt, Francois-Xavier Standaert
Technische Universität Darmstadt, Université de Montpellier, CNRS, LIRMM (France), Université catholique de Louvain -
Succinct Homomorphic Secret Sharing
Damiano Abram, Lawrence Roy, Peter Scholl
Aarhus University -
How to Garble Mixed Circuits that Combine Boolean and Arithmetic Computations
Hanjun Li, Tianren Liu
University of Washington, Peking University -
From Random Probing to Noisy Leakages Without Field-Size Dependence
Gianluca Brian, Stefan Dziembowski, Sebastian Faust
ETH Zürich, University of Warsaw, TU Darmstadt -
Reduction from sparse LPN to LPN, Dual Attack 3.0
Carrier, Debris-Alazard, Meyer-Hilfiger, Tillich
ETIS laboratory CYU, Inria -
Registered Functional Encryptions from Pairings
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
East China Normal University, Shanghai University, Shanghai University of Electric Power -
Accelerating BGV Bootstrapping for Large $p$ Using Null Polynomials Over $\mathbb{Z}_{p^e}$
Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang
Tsinghua University -
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures
Thomas Prest, Thomas Espitau, Guilhem Niot, Ron Steinfeld, Amin Sakzad, Muhammed F. Esgin
PQShield, Monash University -
A General Framework for Lattice-Based ABE using Evasive Inner Product Functional Encryption
一种基于格点的规避内积函数加密ABE通用框架Yao-Ching Hsieh, Huijia Lin, Ji Luo
姚庆燮、林惠嘉、季洛
University of Washington
华盛顿大学 -
Updatable Public Key Encryption, Revisited
可更新公钥加密,再谈Joël Alwen, Georg Fuchsbauer, Marta Mularczyk
Joël Alwen、Georg Fuchsbauer、Marta Mularczyk
AWS, TU Wien AWS,TU Wien -
Symmetric Signcryption and E2EE Messaging in Keybase
Keybase中的对称签密和E2EE消息Joseph Jaeger, Akshaya Kumar, Igors Stepanovs
Joseph Jaeger、Akshaya Kumar、Igors Stepanovs
Georgia Institute of Technology,
乔治亚理工学院, -
Proof-of-Work-based Consensus in Expected-Constant Time
期望恒定时间内基于工作的一致性证明Juan Garay, Aggelos Kiayias, Yu Shen
Juan Garay、Aggelos Kiayias、Yu Shen
Texas A&M University, University of Edinburgh and IOG, University of Edinburgh
德克萨斯农工大学、爱丁堡大学和爱丁堡大学IOG -
A Direct PRF Construction from Kolmogorov Complexity
从Kolmogorov复杂性直接构造PRFYanyi Liu, Rafael Pass
刘燕怡,帕斯
Cornell tech, Tel-Aviv University and Cornell Tech
康奈尔大学、特拉维夫大学和康奈尔大学 -
Diving Deep into the Preimage Security of AES-like Hashing
类AES哈希的预图像安全性研究Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang
陈士耀,郭健,艾力斯,史丹萍,张天宇
Nanyang Technological University, Independent Researcher, Institute of Information Engineering, Chinese Academy of Sciences
南洋理工大学,中国科学院信息工程研究所独立研究员