Publication | Date of Publication | Type |
---|
Succinct vector, polynomial, and functional commitments from lattices | 2023-12-12 | Paper |
Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin | 2023-12-12 | Paper |
One-One Constrained Pseudorandom Functions. | 2023-11-02 | Paper |
Witness encryption and null-iO from evasive LWE | 2023-08-25 | Paper |
Multi-authority ABE from lattices without random oracles | 2023-08-14 | Paper |
Succinct LWE sampling, random polynomials, and obfuscation | 2023-04-13 | Paper |
ABE for DFA from LWE against bounded collusions, revisited | 2023-04-13 | Paper |
Time-space tradeoffs and short collisions in Merkle-Damgård hash functions | 2022-11-09 | Paper |
Functional encryption for attribute-weighted sums from \(k\)-Lin | 2022-11-09 | Paper |
Optimal broadcast encryption and CP-ABE from evasive lattice assumptions | 2022-08-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q5090982 | 2022-07-21 | Paper |
Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin | 2022-05-18 | Paper |
Information-theoretic 2-round MPC without round collapsing: adaptive security, and more | 2022-03-23 | Paper |
Candidate obfuscation via oblivious LWE sampling | 2021-12-08 | Paper |
Adaptively secure ABE for DFA from \(k\)-Lin and more | 2021-12-01 | Paper |
New constructions of statistical NIZKs: dual-mode DV-NIZKs and more | 2021-12-01 | Paper |
Functional encryption for quadratic functions from \(k\)-lin, revisited | 2021-12-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q5140842 | 2020-12-17 | Paper |
Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin | 2020-06-15 | Paper |
Matrix PRFs: constructions, attacks, and applications to obfuscation | 2020-04-30 | Paper |
ABE for DFA from \(k\)-lin | 2020-03-09 | Paper |
Compact adaptively secure ABE for \(\mathrm{NC}^1\) from \(k\)-lin | 2020-02-04 | Paper |
Obfuscating simple functionalities from knowledge assumptions | 2020-01-28 | Paper |
Improved inner-product encryption with adaptive security and full attribute-hiding | 2019-01-23 | Paper |
Traitor-tracing from LWE made simple and attribute-based | 2018-12-06 | Paper |
Tight adaptively secure broadcast encryption with short ciphertexts and keys | 2018-10-17 | Paper |
On the Inner Product Predicate and a Generalization of Matching Vector Families | 2018-10-04 | Paper |
GGH15 beyond permutation branching programs: proofs, attacks, and candidates | 2018-09-26 | Paper |
Attribute-Based Encryption for Circuits | 2018-08-02 | Paper |
Unbounded ABE via bilinear entropy expansion, revisited | 2018-07-09 | Paper |
Towards breaking the exponential barrier for general secret sharing | 2018-07-09 | Paper |
A black-box construction of non-malleable encryption from semantically secure encryption | 2018-04-26 | Paper |
Improved, black-box, non-malleable encryption from semantic security | 2018-04-06 | Paper |
Attribute-hiding predicate encryption in bilinear groups, revisited | 2018-01-19 | Paper |
Private constrained PRFs (and more) from LWE | 2018-01-19 | Paper |
Conditional disclosure of secrets via non-linear reconstruction | 2017-11-03 | Paper |
Multi-input Inner-Product Functional Encryption from Pairings | 2017-06-13 | Paper |
Targeted Homomorphic Attribute-Based Encryption | 2016-12-22 | Paper |
FHE Circuit Privacy Almost for Free | 2016-10-27 | Paper |
Leakage-resilient cryptography from minimal assumptions | 2016-09-21 | Paper |
Tightly CCA-Secure Encryption Without Pairings | 2016-09-09 | Paper |
Obfuscating Conjunctions under Entropic Ring LWE | 2016-04-15 | Paper |
KDM-Security via Homomorphic Smooth Projective Hashing | 2016-04-13 | Paper |
Déjà Q: Encore! Un Petit IBE | 2016-04-08 | Paper |
Security Against Related Randomness Attacks via Reconstructive Extractors | 2016-01-12 | Paper |
Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting | 2015-12-10 | Paper |
Structure-Preserving Signatures from Standard Assumptions, Revisited | 2015-12-10 | Paper |
Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption | 2015-12-10 | Paper |
Predicate Encryption for Circuits from LWE | 2015-12-10 | Paper |
Quasi-Adaptive NIZK for Linear Subspaces Revisited | 2015-09-30 | Paper |
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings | 2015-09-30 | Paper |
Predicate Encryption for Multi-dimensional Range Queries from Lattices | 2015-08-27 | Paper |
Selfish caching in distributed systems | 2015-08-03 | Paper |
Inaccessible entropy | 2015-02-04 | Paper |
Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula | 2014-10-14 | Paper |
Shorter identity-based encryption via asymmetric pairings | 2014-09-04 | Paper |
Attribute-based encryption for circuits | 2014-08-07 | Paper |
Doubly spatial encryption from DBDH | 2014-07-07 | Paper |
Partial Garbling Schemes and Their Applications | 2014-07-01 | Paper |
On the Complexity of UC Commitments | 2014-05-27 | Paper |
Dual System Encryption via Predicate Encodings | 2014-02-18 | Paper |
Fully, (Almost) Tightly Secure IBE and Dual System Groups | 2013-09-17 | Paper |
Functional Encryption: New Perspectives and Lower Bounds | 2013-09-17 | Paper |
On the Security of the TLS Protocol: A Systematic Analysis | 2013-09-02 | Paper |
Leakage-Resilient Cryptography from Minimal Assumptions | 2013-05-31 | Paper |
Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction | 2013-05-31 | Paper |
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS | 2013-04-19 | Paper |
Shorter IBE and Signatures via Asymmetric Pairings | 2013-04-04 | Paper |
Lossy trapdoor functions from homomorphic reproducible encryption | 2012-10-23 | Paper |
Functional Encryption with Bounded Collusions via Multi-party Computation | 2012-09-25 | Paper |
Public Key Encryption against Related Key Attacks | 2012-07-20 | Paper |
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices | 2012-07-20 | Paper |
Efficient Password Authenticated Key Exchange via Oblivious Transfer | 2012-07-20 | Paper |
Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More | 2012-06-29 | Paper |
Threshold and Revocation Cryptosystems via Extractable Hash Proofs | 2011-05-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q3002813 | 2011-05-24 | Paper |
On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations | 2010-08-31 | Paper |
Efficient Chosen-Ciphertext Security via Extractable Hash Proofs | 2010-08-24 | Paper |
On obfuscating point functions | 2010-08-16 | Paper |
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks | 2010-06-01 | Paper |
Universal One-Way Hash Functions via Inaccessible Entropy | 2010-06-01 | Paper |
Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions | 2010-06-01 | Paper |
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols | 2009-12-15 | Paper |
Zero Knowledge in the Random Oracle Model, Revisited | 2009-12-15 | Paper |
Amplifying Collision Resistance: A Complexity-Theoretic Treatment | 2009-03-10 | Paper |
Simple, Black-Box Constructions of Adaptively Secure Protocols | 2009-03-03 | Paper |
Black-Box Constructions of Two-Party Protocols from One-Way Functions | 2009-03-03 | Paper |
Optimal Cryptographic Hardness of Learning Monotone Functions | 2008-08-28 | Paper |
Pebbling and Proofs of Work | 2008-03-17 | Paper |
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One | 2008-03-05 | Paper |
Lower Bounds for Non-interactive Zero-Knowledge | 2007-08-30 | Paper |
One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments | 2007-08-30 | Paper |
Theory of Cryptography | 2007-02-12 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Theory of Cryptography | 2005-12-07 | Paper |
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques | 2005-08-25 | Paper |