


default search action
45th CRYPTO 2025, Santa Barbara, CA, USA - Part IV
- Yael Tauman Kalai, Seny F. Kamara:
Advances in Cryptology - CRYPTO 2025 - 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part IV. Lecture Notes in Computer Science 16003, Springer 2025, ISBN 978-3-032-01883-0
Secure Computation
- Rohit Chatterjee, Xiao Liang, Omkant Pandey, Takashi Yamakawa:
The Round Complexity of Black-Box Post-quantum Secure Computation. 3-35 - Junru Li, Yifan Song:
Constant-Round Asynchronous MPC with Optimal Resilience and Linear Communication. 36-69 - Vipul Goyal, Junru Li, Rafail Ostrovsky, Yifan Song:
Towards Building Scalable Constant-Round MPC from Minimal Assumptions via Round Collapsing. 70-104 - Seunghwan Lee, Jaesang Noh, Taejeong Kim, Dohyuk Kim, Dong-Joon Shin:
Actively Secure MPC in the Dishonest Majority Setting: Achieving Constant Complexity in Online Communication, Computation Per Gate, Rounds, and Private Input Size. 105-139 - Aarushi Goel, Mingyuan Wang, Zhiheng Wang:
Multiparty Distributed Point Functions. 140-173 - Iftach Haitner, Noam Mazor, Jad Silbak, Eliad Tsfadia, Chao Yan:
Computationally Differentially Private Inner-Product Protocols Imply Oblivious Transfer. 174-206 - Zhe Li, Chaoping Xing, Yizhou Yao, Chen Yuan:
Efficient Pseudorandom Correlation Generators over $\mathbb {Z}/p^k\mathbb {Z}$. 207-240 - Nir Bitansky
, Saroja Erabelli
, Rachit Garg
:
Additive Randomized Encodings from Public Key Encryption. 241-260 - Akhil Bandarupalli, Xiaoyu Ji, Aniket Kate, Chen-Da Liu-Zhang, Yifan Song:
Computationally Efficient Asynchronous MPC with Linear Communication and Low Additive Overhead. 261-294 - Jan Bormet, Stefan Dziembowski
, Sebastian Faust
, Tomasz Lizurej
, Marcin Mielniczuk:
Strong Secret Sharing with Snitching. 295-327 - George Lu, Brent Waters:
How to Make Any Computational Secret Sharing Scheme Adaptively Secure. 328-355 - Allison Bishop, Matthew Green, Yuval Ishai
, Abhishek Jain
, Paul Lou
:
Fully Anonymous Secret Sharing. 356-389 - Yuval Ishai, Hanjun Li, Huijia Lin:
A Unified Framework for Succinct Garbling from Homomorphic Secret Sharing. 390-425 - Pierre Meyer
, Claudio Orlandi
, Lawrence Roy
, Peter Scholl
:
Silent Circuit Relinearisation: Sublinear-Size (Boolean and Arithmetic) Garbled Circuits from DCR. 426-458 - Fei Xu, Honggang Hu, Changhong Xu:
Bitwise Garbling Schemes - A Model with 32λ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\frac{3}{2}\lambda $$\end{document}-Bit Lower Bound of Ciphertexts. 459-488 - Geoffroy Couteau
, Carmit Hazay
, Aditya Hegde
, Naman Kumar
:
ømega (1/λ )-Rate Boolean Garbling Scheme from Generic Groups. 489-521 - Kelong Cong
, Emmanuela Orsini
, Erik Pohle
, Oliver Zajonc
:
Row Reduction Techniques for n-Party Garbling. 522-555 - David Heath
, Vladimir Kolesnikov
, Varun Narayanan
, Rafail Ostrovsky
, Akash Shah
:
Multiparty Garbling from OT with Linear Scaling and RAM Support. 556-588 - Jake Januzelli, Mike Rosulek, Lawrence Roy:
Lower Bounds for Garbled Circuits from Shannon-Type Information Inequalities. 589-618 - Raphael Heitjohann, Jonas von der Heyden, Tibor Jager:
Rerandomizable Garbling, Revisited. 619-651 - Hanlin Liu
, Xiao Wang
, Kang Yang
, Yu Yu
:
Authenticated BitGC for Actively Secure Rate-One 2PC. 652-687

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.