54:51
Binyi Chen: LatticeFold - A Lattice-based Folding Scheme and Applications to Succinct Proof Systems
193 views • 3 weeks ago
49:09
Alex Hoover: Plinko - Single-Server PIR with Efficient Updates via Invertible PRFs
48 views • 1 month ago
1:02:45
Paul Lou: Hard Languages in NP ∩ coNP and NIZK Proofs from Unstructured Hardness
70 views • 1 month ago
1:02:09
Matan Shtepel: Maliciously-secure PIR (almost) for free
110 views • 1 month ago
54:56
Neekon Vafa: Memory Checking Requires Logarithmic Overhead
78 views • 1 month ago
56:03
Sourav Das: Adaptively Secure BLS Threshold Signatures from DDH and co-CDH
61 views • 1 month ago
1:04:23
Kabir Tomer: Commitments from Quantum One-Wayness
75 views • 1 month ago
1:03:33
Aditi Partap: Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing
95 views • 2 months ago
54:27
Rachit Garg: Time-Lock Puzzles with Efficient Batch Solving
59 views • 2 months ago
1:04:02
Nathan Geier: Amplification of Non-Interactive Zero Knowledge, Revisited
44 views • 2 months ago
58:37
Ziyi Guan: Security Bounds for Proof-Carrying Data from Straightline Extractors
124 views • 2 months ago
1:07:11
Justin Raizes: Secret Sharing with Certified Deletion
126 views • 3 months ago
1:04:40
Alper Çakan: Unclonable Cryptography with Unbounded Collusions
96 views • 5 months ago
50:26
Quang Dao: Multi-Party Homomorphic Secret Sharing from Sparse Learning Parity with Noise
176 views • 6 months ago
48:29
Noemi Glaeser: Efficient Registration-Based Encryption
275 views • 6 months ago
1:03:19
Chenkai Weng: SUPERPACK: Dishonest Majority MPC with Constant Online Communication
108 views • 7 months ago
44:24
Jiatu Li: Can we find an empty pigeonhole efficiently?
72 views • 8 months ago
45:15
Josh Gancher: Owl - Compositional Verification of Security Protocols
41 views • 8 months ago
1:05:52
Damiano Abram: On the (Im)possibility of Distributed Samplers
108 views • 8 months ago
1:01:29
Gilad Asharov: Perfectly Secure Broadcast and MPC in Constant Expected Time
127 views • 1 year ago
55:02
Guilherme Rito: Deniable Authentication When Signing Keys Leak
128 views • 1 year ago
58:52
Jiahui Liu: Another Round of Breaking and Making Quantum Money
197 views • 1 year ago
20:56
Elisaweta Masserova: Storing and Retrieving Secrets on a Blockchain
107 views • 1 year ago
47:15
Mingxun Zhou: Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation
293 views • 1 year ago
52:32
Jiaxin Guan: A Lower Bound on the Length of Signatures based on Group Actions and Generic Isogenies
120 views • 1 year ago
54:47
Quang Dao: Spartan and Bulletproofs are Simulation-Extractable (for Free!)
173 views • 1 year ago
38:44
Mayank Rathee: ELSA: Secure Aggregation for Federated Learning with Malicious Actors
455 views • 1 year ago
1:07:11
Matheus Venturyne Xavier Ferreira: Transparency and Security via Algorithmic Economics
57 views • 1 year ago
1:01:25
Nicholas Carlini: Auditing the privacy of ML model training
397 views • 1 year ago
44:38
Arthur Lazzaretti: TreePIR: Sublinear time, Polylog Bandwidth PIR from DDH
164 views • 1 year ago
Load More