


default search action
28th Financial Cryptography and Data Security 2024: Willemstad, Curaçao - Part II
- Jeremy Clark

, Elaine Shi:
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14745, Springer 2025, ISBN 978-3-031-78678-5
Feeling Optimistic
- Ertem Nusret Tas, David Tse, Lei Yang, Dionysis Zindros:

Light Clients for Lazy Blockchains. 3-21 - István András Seres

, Noemi Glaeser
, Joseph Bonneau:
Short Paper: Naysayer Proofs. 22-32
Randomness and Time
- Deepak Maram, Mahimna Kelkar, Iddo Bentov, Ari Juels:

GoAT: File Geolocation via Anchor Timestamping. 35-72 - Chen-Da Liu-Zhang

, Elisaweta Masserova
, João Ribeiro
, Pratik Soni
, Sri Aravinda Krishnan Thyagarajan
:
Improved YOSO Randomness Generation with Worst-Case Corruptions. 73-89 - Omid Bodaghi, Reihaneh Safavi-Naini:

Short Paper: Breaking X-VRF, A Post-quantum Verifiable Random Function. 90-100 - Foteini Baldimtsi, Konstantinos Chalkias, Panagiotis Chatzigiannis, Mahimna Kelkar:

Truncator: Time-Space Tradeoff of Cryptographic Primitives. 101-118
Signatures
- Jan Bobolz

, Jesus Diaz
, Markulf Kohlweiss
:
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. 121-139 - Dan Boneh, Aditi Partap, Lior Rotem:

Proactive Refresh for Accountable Threshold Signatures. 140-159 - Sofía Celi

, Scott Griffy
, Lucjan Hanzlik
, Octavio Perez-Kempner
, Daniel Slamanig
:
SoK: Signatures with Randomizable Keys. 160-187 - Foteini Baldimtsi, Konstantinos Kryptos Chalkias, François Garillot, Jonas Lindstrøm, Ben Riva, Arnab Roy, Mahdi Sedaghat, Alberto Sonnino, Pun Waiwitlikhit, Joy Wang:

Subset-Optimized BLS Multi-signature with Key Aggregation. 188-205
Applied Cryptography
- Jiwon Lee, Jaekyoung Choi, Jihye Kim

, Hyunok Oh:
SAVER: SNARK-Compatible Verifiable Encryption. 209-226 - Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot:

Owl: An Augmented Password-Authenticated Key Exchange Scheme. 227-244
PETS
- Ryuya Hayashi, Shuichi Katsumata, Yusuke Sakai:

Anonymous Reputation Systems with Revocation, Revisited. 247-263 - Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert:

Towards Practical Doubly-Efficient Private Information Retrieval. 264-282 - Amin Bashiri, Majid Khabbazian

:
Short Paper: Onion Messages on Leash. 283-292 - François-Xavier Wicht

, Zhipeng Wang
, Duc Viet Le, Christian Cachin
:
A Transaction-Level Model for Blockchain Privacy. 293-310
Designing for the Real World
- Stefan Kitzler

, Stefano Balietti
, Pietro Saggese
, Bernhard Haslhofer
, Markus Strohmaier
:
The Governance of Decentralized Autonomous Organizations: A Study of Contributors' Influence, Networks, and Shifts in Voting Power. 313-330 - Marie Beth van Egmond, Vincent Dunning, Stefan van den Berg, Thomas Rooijakkers, Alex Sangers, Ton Poppe, Jan Veldsink:

Privacy-Preserving Anti-money Laundering Using Secure Multi-party Computation. 331-349 - Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon:

Scan, Shuffle, Rescan: Two-Prover Election Audits With Untrusted Scanners. 350-368 - Massimo Bartoletti, Riccardo Marchesin, Roberto Zunino:

DeFi Composability as MEV Non-interference. 369-387

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














