


default search action
30th ASIACRYPT 2024: Kolkata, India - Part II
- Kai-Min Chung

, Yu Sasaki
:
Advances in Cryptology - ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part II. Lecture Notes in Computer Science 15485, Springer 2025, ISBN 978-981-96-0887-4
Digital Signatures
- Balthazar Bauer, Georg Fuchsbauer, Fabian Regen:

On Security Proofs of Existing Equivalence Class Signature Schemes. 3-37 - Loïc Bidoux, Thibauld Feneuil, Philippe Gaborit, Romaric Neveu, Matthieu Rivain:

Dual Support Decomposition in the Head: Shorter Signatures from Rank SD and MinRank. 38-69 - Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, Aayush Yadav:

Non-Interactive Blind Signatures: Post-Quantum and Stronger Security. 70-104 - Joseph Jaeger

, Roy Stracovsky
:
Dictators? Friends? Forgers. - Breaking and Fixing Unforgeability Definitions for Anamorphic Signature Schemes. 105-137 - Bertram Poettering

, Simon Rastikian:
Digital Signatures with Outsourced Hashing. 138-167 - Xiangyu Liu, Ioannis Tzannetos, Vassilis Zikas:

Adaptor Signatures: New Security Definition and a Generic Construction for NP Relations. 168-193
Public-Key Cryptography
- Geoffroy Couteau, Lalita Devadas, Srinivas Devadas, Alexander Koch

, Sacha Servan-Schreiber:
QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup. 197-231 - Sacha Servan-Schreiber:

Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions. 232-265 - Zhengan Huang

, Junzuo Lai
, Gongxian Zeng
, Jian Weng
:
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation. 266-295 - Scott Griffy

, Anna Lysyanskaya
, Omid Mir
, Octavio Perez-Kempner
, Daniel Slamanig
:
Delegatable Anonymous Credentials from Mercurial Signatures with Stronger Privacy. 296-325 - Mihir Bellare

, Doreen Riepel
, Stefano Tessaro
, Yizhao Zhang:
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange. 326-360 - Alexander Bienstock

, Yevgeniy Dodis
, Paul Rösler
, Daniel Wichs
:
Interval Key-Encapsulation Mechanism. 361-393
Pairing-based Cryptography
- Renas Bacho

, Benedikt Wagner
:
Tightly Secure Non-interactive BLS Multi-signatures. 397-422 - Nils Fleischhacker, Mathias Hall-Andersen

, Mark Simkin
:
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT. 423-453 - Yu Dai, Debiao He, Cong Peng, Zhijian Yang, Chang-an Zhao:

Revisiting Pairing-Friendly Curves with Embedding Degrees 10 and 14. 454-485

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














