We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,112 results
  1. Benchmarking Object Detection Robustness against Real-World Corruptions

    With the rapid recent development, deep learning based object detection techniques have been applied to various real-world software systems,...

    Jiawei Liu, Zhijie Wang, ... Zhenyu Chen in International Journal of Computer Vision
    Article 15 May 2024
  2. Almost Tight Multi-user Security Under Adaptive Corruptions & Leakages in the Standard Model

    In this paper, we consider tight multi-user security under adaptive corruptions, where the adversary can adaptively corrupt some users and obtain...
    Shuai Han, Shengli Liu, Dawu Gu in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
  3. Early Stop** for Any Number of Corruptions

    Minimizing the round complexity of byzantine broadcast is a fundamental question in distributed computing and cryptography. In this work, we present...
    Julian Loss, Jesper Buus Nielsen in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  4. Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions

    In the past decade, much progress has been made on proposing encryption schemes with multi-user security. However, no known work aims at constructing...
    Yunhao Ling, Kai Zhang, ... Haifeng Qian in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  5. Almost Tight Multi-user Security Under Adaptive Corruptions from LWE in the Standard Model

    In this work, we construct the first digital signature (SIG) and public-key encryption (PKE) schemes with almost tight multi-user security under...
    Shuai Han, Shengli Liu, ... Dawu Gu in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  6. Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks

    Many decentralized systems rely on flooding protocols for message dissemination. In such a protocol, the sender of a message sends it to a randomly...
    Christian Matt, Jesper Buus Nielsen, Søren Eller Thomsen in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  7. Anonymous Public Key Encryption Under Corruptions

    Anonymity of public key encryption (PKE) requires that, in a multi-user scenario, the PKE ciphertexts do not leak information about which public keys...
    Zhengan Huang, Junzuo Lai, ... Jian Weng in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  8. Lattice-Based Signatures with Tight Adaptive Corruptions and More

    We construct the first tightly secure signature schemes in the multi-user setting with adaptive corruptions from lattices. In stark contrast to the...
    Jiaxin Pan, Benedikt Wagner in Public-Key Cryptography – PKC 2022
    Conference paper 2022
  9. Twinkle: Threshold Signatures from DDH with Full Adaptive Security

    Sparkle is the first threshold signature scheme in the pairing-free discrete logarithm setting (Crites, Komlo, Maller, Crypto 2023) to be proven...
    Renas Bacho, Julian Loss, ... Chenzhi Zhu in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  10. Adaptive contrast enhancement for underwater image using imaging model guided variational framework

    Underwater images are typically characterized by blurry details, poor contrast, and color distortions owing to absorption and scattering effects,...

    Chenggang Dai, Mingxing Lin in Multimedia Tools and Applications
    Article 11 March 2024
  11. Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions

    Structure-preserving signatures (SPS) have emerged as an important cryptographic building block, as their compatibility with the Groth-Sahai (GS)...
    Aikaterini Mitrokotsa, Sayantan Mukherjee, ... Jenit Tomy in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  12. Benchmarking the Robustness of Deep Neural Networks to Common Corruptions in Digital Pathology

    When designing a diagnostic model for a clinical application, it is crucial to guarantee the robustness of the model with respect to a wide range of...
    Conference paper 2022
  13. A Spectral View of Randomized Smoothing Under Common Corruptions: Benchmarking and Improving Certified Robustness

    Certified robustness guarantee gauges a model’s resistance to test-time attacks and can assess the model’s readiness for deployment in the real...
    Jiachen Sun, Akshay Mehra, ... Z. Morley Mao in Computer Vision – ECCV 2022
    Conference paper 2022
  14. Subspace clustering via adaptive-loss regularized representation learning with latent affinities

    High-dimensional data that lies on several subspaces tend to be highly correlated and contaminated by various noises, and its affinities across...

    Kun Jiang, Lei Zhu, ... Qindong Sun in Pattern Analysis and Applications
    Article 28 February 2024
  15. Fully Adaptive Schnorr Threshold Signatures

    We prove adaptive security of a simple three-round threshold Schnorr signature scheme, which we call...
    Elizabeth Crites, Chelsea Komlo, Mary Maller in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  16. Adaptively Secure MPC with Sublinear Communication Complexity

    A central challenge in the study of MPC is to balance between security guarantees, hardness assumptions, and resources required for the protocol. In...

    Ran Cohen, Abhi Shelat, Daniel Wichs in Journal of Cryptology
    Article 22 March 2023
  17. Tightly CCA-secure encryption scheme in a multi-user setting with corruptions

    The security of public-key encryption (PKE) schemes in a multi-user setting is aimed at capturing real-world scenarios in which an adversary could...

    Youngkyung Lee, Dong Hoon Lee, Jong Hwan Park in Designs, Codes and Cryptography
    Article 02 September 2020
  18. Benchmarking the Robustness of LiDAR Semantic Segmentation Models

    When using LiDAR semantic segmentation models for safety-critical applications such as autonomous driving, it is essential to understand and improve...

    Xu Yan, Chaoda Zheng, ... Dengxin Dai in International Journal of Computer Vision
    Article 12 February 2024
  19. Must the Communication Graph of MPC Protocols be an Expander?

    Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) where a partial network is...

    Elette Boyle, Ran Cohen, ... Pavel Hubáček in Journal of Cryptology
    Article 10 May 2023
  20. Fully Adaptive Decentralized Multi-Authority ABE

    Decentralized multi-authority attribute-based encryption ( $$\textsf{MA}\text...
    Pratish Datta, Ilan Komargodski, Brent Waters in Advances in Cryptology – EUROCRYPT 2023
    Conference paper 2023
Did you find what you were looking for? Share feedback.