default search action
36th CRYPTO 2016: Santa Barbara, CA, USA - Part III
- Matthew Robshaw, Jonathan Katz:
Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. Lecture Notes in Computer Science 9816, Springer 2016, ISBN 978-3-662-53014-6
Quantum Techniques
- Yfke Dulek, Christian Schaffner, Florian Speelman:
Quantum Homomorphic Encryption for Polynomial-Sized Circuits. 3-32 - Frédéric Dupuis, Serge Fehr, Philippe Lamontagne, Louis Salvail:
Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications. 33-59 - Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner:
Semantic Security and Indistinguishability in the Quantum World. 60-89
Spooky Encryption
- Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:
Spooky Encryption and Its Applications. 93-122 - Cynthia Dwork, Moni Naor, Guy N. Rothblum:
Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems. 123-145
Secure Computation and Protocols II
- Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs:
Adaptively Secure Garbled Circuits from One-Way Functions. 149-178 - Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Jesper Buus Nielsen:
Rate-1, Linear Time and Additively Homomorphic UC Commitments. 179-207 - Jan Camenisch, Maria Dubovitskaya, Alfredo Rial:
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens. 208-239 - Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:
Probabilistic Termination and Composability of Cryptographic Protocols. 240-269 - Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti:
Concurrent Non-Malleable Commitments (and More) in 3 Rounds. 270-299
IBE, ABE, and Functional Encryption
- Jiang Zhang, Yu Chen, Zhenfeng Zhang:
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. 303-332 - Shweta Agrawal, Benoît Libert, Damien Stehlé:
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions. 333-362 - Zvika Brakerski, Vinod Vaikuntanathan:
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security. 363-384
Automated Tools and Synthesis
- Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo:
Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming. 387-415 - Brent Carmer, Mike Rosulek:
Linicrypt: A Model for Practical Cryptography. 416-445
Zero Knowledge
- Benny Applebaum, Pavel Raykov:
On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings. 449-477 - Carsten Baum, Ivan Damgård, Kasper Green Larsen, Michael Nielsen:
How to Prove Knowledge of Small Secrets. 478-498 - Melissa Chase, Chaya Ganesh, Payman Mohassel:
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials. 499-530
Theory
- Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Fine-Grained Cryptography. 533-562 - Sanjam Garg, Payman Mohassel, Charalampos Papamanthou:
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption. 563-592 - Andrej Bogdanov, Yuval Ishai, Emanuele Viola, Christopher Williamson:
Bounded Indistinguishability and the Complexity of Recovering Secrets. 593-618 - Nico Döttling, Nils Fleischhacker, Johannes Krupp, Dominique Schröder:
Two-Message, Oblivious Evaluation of Cryptographic Functionalities. 619-648
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.