We introduce a new primitive, called trapdoor hash functions (TDH), which are hash functions H:{0, 1\}^ n → {0, 1\}^ λ with additional trapdoor function-like properties …
We study the problem of designing non-interactive batch arguments for NP NP. Such an argument system allows an efficient prover to prove multiple NP NP statements, with size …
Laconic cryptography is an emerging paradigm that enables cryptographic primitives with sublinear communication complexity in just two messages. In particular, a two-message …
Q Dao, A Jain - Annual International Cryptology Conference, 2024 - Springer
Over the past few decades, we have seen a proliferation of advanced cryptographic primitives with lossy or homomorphic properties built from various assumptions such as …
Q Dao, A Jain, Z Jin - Annual International Cryptology Conference, 2024 - Springer
We give the first construction of non-interactive zero-knowledge (NIZK) arguments from post- quantum assumptions other than Learning with Errors. In particular, we achieve NIZK under …
In this work, we introduce the notion of registration-based encryption (RBE for short) with the goal of removing the trust parties need to place in the private-key generator in an IBE …
Over the past two years, the spread of COVID-19 has spurred the use of information and communication technologies (ICT) in aid of healthcare. The need to guarantee continuity to …
R Goyal, V Koppula, B Waters - Proceedings of the 50th Annual ACM …, 2018 - dl.acm.org
In this work we provide a traitor tracing construction with ciphertexts that grow polynomially in log (n) where n is the number of users and prove it secure under the Learning with Errors …
We show a new general approach for constructing maliciously-secure two-round oblivious transfer (OT). Specifically, we provide a generic sequence of transformations to upgrade a …