default search action
30th ASIACRYPT 2024: Kolkata, India - Part II
- Kai-Min Chung, Yu Sasaki:
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15485, Springer 2025, ISBN 978-981-96-0887-4
Digital Signatures
- Balthazar Bauer, Georg Fuchsbauer, Fabian Regen:
On Security Proofs of Existing Equivalence Class Signature Schemes. 3-37 - Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain:
Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank. 38-69 - Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, Aayush Yadav:
Non-Interactive Blind Signatures: Post-Quantum and Stronger Security. 70-104 - Joseph Jaeger, Roy Stracovsky:
Dictators? Friends? Forgers. - Breaking and Fixing Unforgeability Definitions for Anamorphic Signature Schemes. 105-137 - Bertram Poettering, Simon Rastikian:
Digital Signatures with Outsourced Hashing. 138-167 - Xiangyu Liu, Ioannis Tzannetos, Vassilis Zikas:
Adaptor Signatures: New Security Definition and a Generic Construction for NP Relations. 168-193
Public-Key Cryptography
- Geoffroy Couteau, Lalita Devadas, Srinivas Devadas, Alexander Koch, Sacha Servan-Schreiber:
QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup. 197-231 - Sacha Servan-Schreiber:
Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions. 232-265 - Zhengan Huang, Junzuo Lai, Gongxian Zeng, Jian Weng:
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation. 266-295 - Scott Griffy, Anna Lysyanskaya, Omid Mir, Octavio Perez-Kempner, Daniel Slamanig:
Delegatable Anonymous Credentials from Mercurial Signatures with Stronger Privacy. 296-325 - Mihir Bellare, Doreen Riepel, Stefano Tessaro, Yizhao Zhang:
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange. 326-360 - Alexander Bienstock, Yevgeniy Dodis, Paul Rösler, Daniel Wichs:
Interval Key-Encapsulation Mechanism. 361-393
Pairing-based Cryptography
- Renas Bacho, Benedikt Wagner:
Tightly Secure Non-interactive BLS Multi-signatures. 397-422 - Nils Fleischhacker, Mathias Hall-Andersen, Mark Simkin:
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT. 423-453 - Yu Dai, Debiao He, Cong Peng, Zhijian Yang, Chang-an Zhao:
Revisiting Pairing-Friendly Curves with Embedding Degrees 10 and 14. 454-485
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.