Succinct Scriptable NIZK via Trusted Hardware | 0 | 0.34 | 2021 |
Correlated Randomness Teleportation via Semi-trusted Hardware-Enabling Silent Multi-party Computation | 0 | 0.34 | 2021 |
Leakage Resilience from Program Obfuscation | 0 | 0.34 | 2019 |
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog. | 2 | 0.36 | 2019 |
Fractal: A New Paradigm for High-Performance Proof-of-Stake Blockchains | 0 | 0.34 | 2019 |
Statement Voting. | 0 | 0.34 | 2019 |
Correcting Subverted Random Oracles. | 1 | 0.34 | 2018 |
A Generic Paradigm For Blockchain Design | 0 | 0.34 | 2018 |
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation. | 0 | 0.34 | 2018 |
Multi-mode Cryptocurrency Systems. | 1 | 0.35 | 2018 |
Multi-key FHE for multi-bit messages. | 1 | 0.37 | 2018 |
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake. | 3 | 0.39 | 2018 |
Towards Quantum One-Time Memories From Stateless Hardware | 0 | 0.34 | 2018 |
Generic Semantic Security against a Kleptographic Adversary. | 6 | 0.40 | 2017 |
Brief Announcement: Statement Voting and Liquid Democracy. | 1 | 0.41 | 2017 |
Digital Liquid Democracy: How to Vote Your Delegation Statement. | 0 | 0.34 | 2017 |
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake. | 0 | 0.34 | 2017 |
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake). | 0 | 0.34 | 2017 |
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power. | 0 | 0.34 | 2016 |
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. | 1 | 0.35 | 2016 |
Cliptography: Clipping the Power of Kleptographic Attacks. | 3 | 0.37 | 2016 |
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption. | 2 | 0.38 | 2016 |
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond. | 7 | 0.47 | 2016 |
Cryptography For Parallel Ram From Indistinguishability Obfuscation | 10 | 0.51 | 2016 |
Computation-Trace Indistinguishability Obfuscation and its Applications. | 6 | 0.45 | 2015 |
Incoercible Multi-Party Computation And Universally Composable Receipt-Free Voting | 4 | 0.41 | 2015 |
Fair and Robust Multi-Party Computation using a Global Transaction Ledger. | 16 | 0.81 | 2015 |
Multi-Client Verifiable Computation with Stronger Security Guarantees. | 19 | 0.61 | 2015 |
Distributing the setup in universally composable multi-party computation | 2 | 0.36 | 2014 |
Non-Interactive Cryptography in the RAM Model of Computation. | 2 | 0.38 | 2014 |
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware. | 9 | 0.45 | 2014 |
Locally Decodable and Updatable Non-malleable Codes and Their Applications. | 15 | 0.54 | 2014 |
Multi-Input Functional Encryption. | 38 | 1.02 | 2014 |
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. | 4 | 0.37 | 2014 |
Functional Encryption from (Small) Hardware Tokens | 1 | 0.35 | 2013 |
Feasibility and completeness of cryptographic tasks in the quantum world | 6 | 0.45 | 2013 |
On the security of the "Free-XOR" technique | 30 | 1.12 | 2012 |
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens. | 0 | 0.34 | 2011 |
Adaptively secure broadcast, revisited | 13 | 0.88 | 2011 |
Secure Function Collection with Sublinear Storage | 1 | 0.36 | 2009 |
Hidden identity-based signatures | 4 | 0.48 | 2009 |
Zero-Knowledge Proofs with Witness Elimination | 1 | 0.35 | 2009 |
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer | 32 | 0.87 | 2009 |
Equivocal blind signatures and adaptive UC-security | 18 | 0.67 | 2008 |
Sound and Fine-grain Specification of Ideal Functionalities. | 0 | 0.34 | 2008 |
A Framework for the Sound Specification of Cryptographic Tasks | 0 | 0.34 | 2008 |
Trading static for adaptive security in universally composable zero-knowledge | 1 | 0.35 | 2007 |
Concurrent blind signatures without random oracles | 93 | 3.26 | 2006 |