


default search action
28th Financial Cryptography and Data Security 2024: Willemstad, Curaçao - Part II
- Jeremy Clark
, Elaine Shi:
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14745, Springer 2025, ISBN 978-3-031-78678-5
Feeling Optimistic
- Ertem Nusret Tas, David Tse, Lei Yang, Dionysis Zindros:
Light Clients for Lazy Blockchains. 3-21 - István András Seres
, Noemi Glaeser
, Joseph Bonneau:
Short Paper: Naysayer Proofs. 22-32
Randomness and Time
- Deepak Maram, Mahimna Kelkar, Iddo Bentov, Ari Juels:
GoAT: File Geolocation via Anchor Timestamping. 35-72 - Chen-Da Liu-Zhang
, Elisaweta Masserova
, João Ribeiro
, Pratik Soni
, Sri Aravinda Krishnan Thyagarajan
:
Improved YOSO Randomness Generation with Worst-Case Corruptions. 73-89 - Omid Bodaghi, Reihaneh Safavi-Naini:
Short Paper: Breaking X-VRF, A Post-quantum Verifiable Random Function. 90-100 - Foteini Baldimtsi, Konstantinos Chalkias, Panagiotis Chatzigiannis, Mahimna Kelkar:
Truncator: Time-Space Tradeoff of Cryptographic Primitives. 101-118
Signatures
- Jan Bobolz
, Jesus Diaz
, Markulf Kohlweiss
:
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. 121-139 - Dan Boneh, Aditi Partap, Lior Rotem:
Proactive Refresh for Accountable Threshold Signatures. 140-159 - Sofía Celi
, Scott Griffy
, Lucjan Hanzlik
, Octavio Perez-Kempner
, Daniel Slamanig
:
SoK: Signatures with Randomizable Keys. 160-187 - Foteini Baldimtsi, Konstantinos Kryptos Chalkias, François Garillot, Jonas Lindstrøm, Ben Riva, Arnab Roy, Mahdi Sedaghat, Alberto Sonnino, Pun Waiwitlikhit, Joy Wang:
Subset-Optimized BLS Multi-signature with Key Aggregation. 188-205
Applied Cryptography
- Jiwon Lee, Jaekyoung Choi, Jihye Kim
, Hyunok Oh:
SAVER: SNARK-Compatible Verifiable Encryption. 209-226 - Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot:
Owl: An Augmented Password-Authenticated Key Exchange Scheme. 227-244
PETS
- Ryuya Hayashi, Shuichi Katsumata, Yusuke Sakai:
Anonymous Reputation Systems with Revocation, Revisited. 247-263 - Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert:
Towards Practical Doubly-Efficient Private Information Retrieval. 264-282 - Amin Bashiri, Majid Khabbazian
:
Short Paper: Onion Messages on Leash. 283-292 - François-Xavier Wicht
, Zhipeng Wang, Duc Viet Le, Christian Cachin
:
A Transaction-Level Model for Blockchain Privacy. 293-310
Designing for the Real World
- Stefan Kitzler
, Stefano Balietti
, Pietro Saggese
, Bernhard Haslhofer
, Markus Strohmaier
:
The Governance of Decentralized Autonomous Organizations: A Study of Contributors' Influence, Networks, and Shifts in Voting Power. 313-330 - Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, Jan Veldsink:
Privacy-Preserving Anti-money Laundering Using Secure Multi-party Computation. 331-349 - Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon:
Scan, Shuffle, Rescan: Two-Prover Election Audits With Untrusted Scanners. 350-368 - Massimo Bartoletti, Riccardo Marchesin, Roberto Zunino:
DeFi Composability as MEV Non-interference. 369-387

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.