


default search action
29th ASIACRYPT 2023: Guangzhou, China - Part I
- Jian Guo

, Ron Steinfeld
:
Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14438, Springer 2023, ISBN 978-981-99-8720-7
Secure Multi-party Computation
- Yann Disser

, Daniel Günther
, Thomas Schneider
, Maximilian Stillger, Arthur Wigandt, Hossein Yalame
:
Breaking the Size Barrier: Universal Circuits Meet Lookup Tables. 3-37 - Fuchun Lin, Chaoping Xing

, Yizhou Yao, Chen Yuan:
Amortized NISC over $\mathbb {Z}_{2^k}$ from RMFE. 38-70 - Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai:

Two-Round Concurrent 2PC from Sub-exponential LWE. 71-105 - Daniel Escudero, Cheng Hong

, Hongqing Liu, Chaoping Xing
, Chen Yuan:
Degree-D Reverse Multiplication-Friendly Embeddings: Constructions and Applications. 106-138 - Estuardo Alpirez Bock

, Chris Brzuska, Pihla Karanko, Sabine Oechsner
, Kirthivaasan Puniamurthy
:
Adaptive Distributional Security for Garbling Schemes with 𝒪(|x|) Online Complexity. 139-171 - Mariana Gama

, Emad Heydari Beni
, Emmanuela Orsini
, Nigel P. Smart
, Oliver Zajonc
:
MPC with Delayed Parties over Star-Like Networks. 172-203 - Hongqing Liu, Chaoping Xing

, Yanjiang Yang, Chen Yuan:
Ramp Hyper-invertible Matrices and Their Applications to MPC Protocols. 204-236 - Xiang Liu

, Ying Gao
:
Scalable Multi-party Private Set Union from Multi-query Secret-Shared Private Membership Test. 237-271 - Yi Liu

, Junzuo Lai
, Qi Wang
, Xianrui Qin
, Anjia Yang
, Jian Weng
:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. 272-301 - Hanjun Li

, Huijia Lin, Antigoni Polychroniadou, Stefano Tessaro:
LERNA: Secure Single-Server Aggregation via Key-Homomorphic Masking. 302-334 - Reo Eriguchi:

Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity. 335-368
Threshold Cryptography
- Katharina Boudgoust

, Peter Scholl
:
Simple Threshold (Fully Homomorphic) Encryption from LWE with Polynomial Modulus. 371-404 - Shahla Atapoor

, Karim Baghery
, Daniele Cozzo
, Robi Pedersen
:
VSS from Distributed ZK Proofs and Applications. 405-440 - Thibauld Feneuil

, Matthieu Rivain
:
Threshold Linear Secret Sharing to the Rescue of MPC-in-the-Head. 441-473

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














