We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 9,132 results
  1. Functional Commitments for All Functions, with Transparent Setup and from SIS

    A functional commitment scheme enables a user to concisely commit to a function from a specified family, then later concisely and verifiably reveal...
    Leo de Castro, Chris Peikert in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  2. A discrete SIS-model built on the strictly positive scheme

    In this paper we introduce and analyze a discrete SIS epidemic model for a homogeneous population. As a discretization method the strictly positive...

    Article Open access 09 May 2023
  3. LaBRADOR: Compact Proofs for R1CS from Module-SIS

    The most compact quantum-safe proof systems for large circuits are PCP-type systems such as Ligero, Aurora, and Shockwave, that only use weak...
    Ward Beullens, Gregor Seiler in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  4. Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis

    A functional commitment allows a user to commit to an input $$\textbf{x}\in...
    Hoeteck Wee, David J. Wu in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  5. On the (M)iNTRU Assumption in the Integer Case

    In AsiaCrypt 2019, Genise, Gentry, Halevi, Li and Micciancio put forth two novel and intriguing computational hardness hypotheses: The inhomogeneous...
    Jim Barthel, Volker Müller, Răzvan Roşie in Provable and Practical Security
    Conference paper 2021
  6. SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions

    Recent works on lattice-based extractable polynomial commitments can be grouped into two classes: (i) non-interactive constructions that stem from...
    Martin R. Albrecht, Giacomo Fenzi, ... Ngoc Khanh Nguyen in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  7. Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties

    Blockchain plays an important role in distributed file systems, such as cryptocurrency. One of the important building blocks of blockchain is the...
    Hideaki Miyaji, Atsuko Miyaji in Cryptology and Network Security
    Conference paper 2023
  8. Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain

    Chameleon hash (CH) is a trapdoor hash function. Generally it is hard to find collisions, but with the help of a trapdoor, finding collisions becomes...
    Yiming Li, Shengli Liu in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  9. Message-Restriction-Free Commitment Scheme Based on Lattice Assumption

    A commitment scheme is a fundamental protocol and an essential component of basic cryptographic tasks, such as zero-knowledge identification. In...
    Hideaki Miyaji, Yuntao Wang, Atsuko Miyaji in Information Security Practice and Experience
    Conference paper 2021
  10. Succinct Vector, Polynomial, and Functional Commitments from Lattices

    Vector commitment schemes allow a user to commit to a vector of values...
    Hoeteck Wee, David J. Wu in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  11. Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice

    Vector commitments (VC) and their variants attract a lot of attention due to their wide range of usage in applications such as blockchain and...
    Hongxiao Wang, Siu-Ming Yiu, ... Zoe L. Jiang in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  12. Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices

    We provide identity-based signature (IBS) schemes with tight security against adaptive adversaries, in the (classical or quantum) random oracle model...
    Éric Sageloli, Pierre Pébereau, ... Céline Chevalier in Applied Cryptography and Network Security
    Conference paper 2023
  13. On the usage of epidemiological models for information diffusion over twitter

    The way information spreads through online social networks is popularly considered to be similar to how viruses spread through a population. In this...

    Nirmal Kumar Sivaraman, Shivansh Baijal, Sakthi Balan Muthiah in Social Network Analysis and Mining
    Article 16 October 2023
  14. Sigma Protocols for MQ, PKP and SIS, and Fishy Signature Schemes

    This work presents sigma protocols to prove knowledge of:...
    Conference paper 2020
  15. Short Identity-Based Signatures with Tight Security from Lattices

    We construct a short and adaptively secure identity-based signature scheme tightly based on the well-known Short Integer Solution (SIS) assumption....
    Jiaxin Pan, Benedikt Wagner in Post-Quantum Cryptography
    Conference paper 2021
  16. CTA: Confidential Transactions Protocol with State Accumulator

    Considering the increasingly large storage of post-quantum RingCT-like protocols, we construct a blockchain-based confidential transactions protocol...
    Shumin Si, Puwen Wei, ... Li Liu in Cryptology and Network Security
    Conference paper 2023
  17. A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions

    A software watermarking scheme is to embed a “mark” or a message into a program in a cryptographic way. It is useful in proving ownership (e.g., in...
    Yanmin Zhao, Yang Wang, ... Meiqin Wang in Security and Trust Management
    Conference paper 2023
  18. Multilinear Schwartz-Zippel Mod N and Lattice-Based Succinct Arguments

    We show that for \(\textbf{x}\overset{\$}{\leftarrow }[0,2^\lambda )^\mu \)...
    Benedikt Bünz, Ben Fisch in Theory of Cryptography
    Conference paper 2023
  19. Puncturable Signature: A Generic Construction and Instantiations

    Puncturable signature (PS), proposed by Bellare, Stepanovs and Waters at EUROCRYPT 2016, is a special kind of digital signature that supports a...
    Mei Jiang, Dung Hoang Duong, Willy Susilo in Computer Security – ESORICS 2022
    Conference paper 2022
  20. Validation of the Delone and McLean information systems success model: a study on student information system

    This study aims to evaluate the success of the Student Information System (SIS) using the updated Information System Success Model (IS success model)...

    Kamil Çelik, Ahmet Ayaz in Education and Information Technologies
    Article 15 November 2021
Did you find what you were looking for? Share feedback.