default search action
21st TCC 2023: Taipei, Taiwan - Part IV
- Guy N. Rothblum, Hoeteck Wee:
Theory of Cryptography - 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14372, Springer 2023, ISBN 978-3-031-48623-4
Lattices
- Charles Meyer-Hilfiger, Jean-Pierre Tillich:
Rigorous Foundations for Dual Attacks in Coding Theory. 3-32 - Roman Langrehr:
On the Multi-user Security of LWE-Based NIKE. 33-62 - Joël Felderhoff, Alice Pellet-Mary, Damien Stehlé, Benjamin Wesolowski:
Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals. 63-92 - Prabhanjan Ananth, Alexander Poremba, Vinod Vaikuntanathan:
Revocable Cryptography from Learning with Errors. 93-122
Quantum Cryptography
- Amit Behera, Zvika Brakerski, Or Sattath, Omri Shmueli:
Pseudorandomness with Proof of Destruction and Applications. 125-154 - Céline Chevalier, Paul Hermouet, Quoc-Huy Vu:
Semi-quantum Copy-Protection and More. 155-182 - James Bartusek, Dakshita Khurana, Giulio Malavolta, Alexander Poremba, Michael Walter:
Weakening Assumptions for Publicly-Verifiable Deletion. 183-197 - Khashayar Barooti, Alex B. Grilo, Loïs Huguenin-Dumittan, Giulio Malavolta, Or Sattath, Quoc-Huy Vu, Michael Walter:
Public-Key Encryption with Quantum Keys. 198-227 - Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa:
Publicly Verifiable Deletion from Minimal Assumptions. 228-245 - Fuyuki Kitagawa, Ryo Nishimaki:
One-Out-of-Many Unclonable Cryptography: Definitions, Constructions, and More. 246-275
Group-Based Cryptography
- Dominik Hartmann, Eike Kiltz:
Limits in the Provable Security of ECDSA Signatures. 279-309 - Daniele Cozzo, Emanuele Giunta:
Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols. 310-335 - Charlotte Hoffmann, Pavel Hubácek, Chethan Kamath, Tomás Krnák:
(Verifiable) Delay Functions from Lucas Sequences. 336-362 - Helger Lipmaa, Roberto Parisella, Janno Siim:
Algebraic Group Model with Oblivious Sampling. 363-392
Byzantine Agreement, Consensus and Composability
- Julian Loss, Gilad Stern:
Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults. 395-421 - Ran Cohen, Pouyan Forghani, Juan A. Garay, Rutvik Patel, Vassilis Zikas:
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited. 422-451 - Benjamin Y. Chan, Rafael Pass:
Simplex Consensus: A Simple and Fast Consensus Protocol. 452-479 - Christian Badertscher, Michele Ciampi, Aggelos Kiayias:
Agile Cryptography: A Universally Composable Approach. 480-509 - Robin Berger, Brandon Broadnax, Michael Klooß, Jeremias Mechler, Jörn Müller-Quade, Astrid Ottenhues, Markus Raiber:
Composable Long-Term Security with Rewinding. 510-541
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.