We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency

    Polynomial commitments schemes are a powerful tool that enables one party to commit to a polynomial p of degree d , and prove that the committed...

    Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen in Journal of Cryptology
    Article Open access 10 July 2024
  2. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  3. The NP-hard problem of computing the maximal sample variance over interval data is solvable in almost linear time with a high probability

    We consider the algorithm by Ferson et al. (Reliab Comput 11(3):207--233, 2005) designed for solving the NP-hard problem of computing the maximal...

    M. Rada, M. Černý, O. Sokol in computational complexity
    Article 03 July 2024
  4. Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes

    Chameleon-hash functions, introduced by Krawczyk and Rabin (NDSS’00), are trapdoor collision-resistant hash functions parametrized by a public key....

    David Derler, Kai Samelin, Daniel Slamanig in Journal of Cryptology
    Article Open access 02 July 2024
  5. Algebraically Structured LWE, Revisited

    In recent years, there has been a proliferation of algebraically structured Learning With Errors (LWE) variants, including Ring-LWE, Module-LWE,...

    Chris Peikert, Zachary Pepin in Journal of Cryptology
    Article 13 June 2024
  6. Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for \(\varvec{\Sigma }\)-Protocols

    The Schnorr identification and signature schemes have been among the most influential cryptographic protocols of the past 3 decades. Unfortunately,...

    Lior Rotem, Gil Segev in Journal of Cryptology
    Article 06 June 2024
  7. Simple Constructions from (Almost) Regular One-Way Functions

    Two of the most useful cryptographic primitives that can be constructed from one-way functions are pseudorandom generators (PRGs) and universal...

    Noam Mazor, Jiapeng Zhang in Journal of Cryptology
    Article Open access 30 May 2024
  8. Streaming approximation resistance of every ordering CSP

    Noah G. Singer, Madhu Sudan, Santhoshini Velusamy in computational complexity
    Article Open access 29 May 2024
  9. Algebraic Global Gadgetry for Surjective Constraint Satisfaction

    The constraint satisfaction problem (CSP) on a finite relational structure B is to decide, given a set of constraints on variables where the...

    Hubie Chen in computational complexity
    Article Open access 29 May 2024
  10. Limits of Preprocessing

    Yuval Filmus, Yuval Ishai, ... Guy Kindler in computational complexity
    Article Open access 23 May 2024
  11. Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors

    We put forward two natural generalizations of predicate encryption (PE), dubbed multi-key and multi-input PE. More in details, our contributions are...

    Danilo Francati, Daniele Friolo, ... Daniele Venturi in Journal of Cryptology
    Article Open access 14 May 2024
  12. Compact NIZKs from Standard Assumptions on Bilinear Maps

    A non-interactive zero-knowledge (NIZK) protocol enables a prover to convince a verifier of the truth of a statement without leaking any other...

    Shuichi Katsumata, Ryo Nishimaki, ... Takashi Yamakawa in Journal of Cryptology
    Article 13 May 2024
  13. KRW Composition Theorems via Lifting

    Susanna F. de Rezende, Or Meir, ... Robert Robere in computational complexity
    Article 29 April 2024
  14. Watermarking PRFs and PKE Against Quantum Adversaries

    We initiate the study of software watermarking against quantum adversaries. A quantum adversary generates a quantum state as a pirate software that...

    Fuyuki Kitagawa, Ryo Nishimaki in Journal of Cryptology
    Article 26 April 2024
  15. Cryptographic Primitives with Hinting Property

    A hinting pseudorandom generator (PRG) is a potentially stronger variant of PRG with a “deterministic” form of circular security with respect to the...

    Navid Alamati, Sikhar Patranabis in Journal of Cryptology
    Article 23 April 2024
  16. Analysis of Multivariate Encryption Schemes: Application to Dob and \({C}^{*}\)

    A common strategy for constructing multivariate encryption schemes is to use a central map that is easy to invert over an extension field, along with...

    Morten Øygarden, Patrick Felke, Håvard Raddum in Journal of Cryptology
    Article 18 April 2024
  17. Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery

    The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher, one expects to...

    Qianqian Yang, Ling Song, ... Jian Weng in Journal of Cryptology
    Article 10 April 2024
  18. Bitcoin as a Transaction Ledger: A Composable Treatment

    Bitcoin is one of the most prominent examples of a distributed cryptographic protocol that is extensively used in reality. Nonetheless, existing...

    Christian Badertscher, Ueli Maurer, ... Vassilis Zikas in Journal of Cryptology
    Article Open access 04 April 2024
Did you find what you were looking for? Share feedback.