Search
Search Results
-
Benchmarking Object Detection Robustness against Real-World Corruptions
With the rapid recent development, deep learning based object detection techniques have been applied to various real-world software systems,...
-
Almost Tight Multi-user Security Under Adaptive Corruptions & Leakages in the Standard Model
In this paper, we consider tight multi-user security under adaptive corruptions, where the adversary can adaptively corrupt some users and obtain... -
Early Stop** for Any Number of Corruptions
Minimizing the round complexity of byzantine broadcast is a fundamental question in distributed computing and cryptography. In this work, we present... -
Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions
In the past decade, much progress has been made on proposing encryption schemes with multi-user security. However, no known work aims at constructing... -
Almost Tight Multi-user Security Under Adaptive Corruptions from LWE in the Standard Model
In this work, we construct the first digital signature (SIG) and public-key encryption (PKE) schemes with almost tight multi-user security under... -
Formalizing Delayed Adaptive Corruptions and the Security of Flooding Networks
Many decentralized systems rely on flooding protocols for message dissemination. In such a protocol, the sender of a message sends it to a randomly... -
Anonymous Public Key Encryption Under Corruptions
Anonymity of public key encryption (PKE) requires that, in a multi-user scenario, the PKE ciphertexts do not leak information about which public keys... -
Lattice-Based Signatures with Tight Adaptive Corruptions and More
We construct the first tightly secure signature schemes in the multi-user setting with adaptive corruptions from lattices. In stark contrast to the... -
Twinkle: Threshold Signatures from DDH with Full Adaptive Security
Sparkle is the first threshold signature scheme in the pairing-free discrete logarithm setting (Crites, Komlo, Maller, Crypto 2023) to be proven... -
Adaptive contrast enhancement for underwater image using imaging model guided variational framework
Underwater images are typically characterized by blurry details, poor contrast, and color distortions owing to absorption and scattering effects,...
-
Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions
Structure-preserving signatures (SPS) have emerged as an important cryptographic building block, as their compatibility with the Groth-Sahai (GS)... -
Benchmarking the Robustness of Deep Neural Networks to Common Corruptions in Digital Pathology
When designing a diagnostic model for a clinical application, it is crucial to guarantee the robustness of the model with respect to a wide range of... -
A Spectral View of Randomized Smoothing Under Common Corruptions: Benchmarking and Improving Certified Robustness
Certified robustness guarantee gauges a model’s resistance to test-time attacks and can assess the model’s readiness for deployment in the real... -
Subspace clustering via adaptive-loss regularized representation learning with latent affinities
High-dimensional data that lies on several subspaces tend to be highly correlated and contaminated by various noises, and its affinities across...
-
Fully Adaptive Schnorr Threshold Signatures
We prove adaptive security of a simple three-round threshold Schnorr signature scheme, which we call... -
Adaptively Secure MPC with Sublinear Communication Complexity
A central challenge in the study of MPC is to balance between security guarantees, hardness assumptions, and resources required for the protocol. In...
-
Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
The security of public-key encryption (PKE) schemes in a multi-user setting is aimed at capturing real-world scenarios in which an adversary could...
-
Benchmarking the Robustness of LiDAR Semantic Segmentation Models
When using LiDAR semantic segmentation models for safety-critical applications such as autonomous driving, it is essential to understand and improve...
-
Must the Communication Graph of MPC Protocols be an Expander?
Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) where a partial network is...
-
Fully Adaptive Decentralized Multi-Authority ABE
Decentralized multi-authority attribute-based encryption ( $$\textsf{MA}\text...