Author of the publication

Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate.

, and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 448-479. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate., and . CRYPTO (2), volume 11693 of Lecture Notes in Computer Science, page 448-479. Springer, (2019)Structure-Preserving and Re-randomizable RCCA-Secure Public Key Encryption and Its Applications., , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 159-190. Springer, (2019)Real-world Universal zkSNARKs are non-malleable., , and . IACR Cryptol. ePrint Arch., (2024)Auditable Asymmetric Password Authenticated Public Key Establishment., , , and . IACR Cryptol. ePrint Arch., (2020)Predictable Arguments of Knowledge., , and . Public Key Cryptography (1), volume 10174 of Lecture Notes in Computer Science, page 121-150. Springer, (2017)Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption., and . ACNS (1), volume 12146 of Lecture Notes in Computer Science, page 271-291. Springer, (2020)Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage., , and . IMACC, volume 9496 of Lecture Notes in Computer Science, page 311-328. Springer, (2015)Proofs of Space: When Space Is of the Essence., , , and . SCN, volume 8642 of Lecture Notes in Computer Science, page 538-557. Springer, (2014)Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model., , , , and . CRYPTO (3), volume 12172 of Lecture Notes in Computer Science, page 127-155. Springer, (2020)Mix-Nets from Re-randomizable and Replayable CCA-Secure Public-Key Encryption., and . SCN, volume 13409 of Lecture Notes in Computer Science, page 172-196. Springer, (2022)