cover_image

【论文速递】PKC'24(签名、承诺、零知识证明、格)

Kurt Pan XPTY
2024年04月25日 14:09
  • https://pkc.iacr.org/2024/program.php
  • 论文超链接🔗可点击最下面👇「阅读原文」查看。(We cannot imagine a so-called "Internet" that does not have hyperlinks.)

Signatures

  • On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions
  • Fully Dynamic Attribute-Based Signatures for Circuits from Codes
  • On Instantiating Unleveled Fully-Homomorphic Signatures from Falsifiable Assumptions
  • Updatable Policy-Compliant Signatures
  • Registered Attribute-Based Signature
  • Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions
  • Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing
  • ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head
  • Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model
  • Formalizing Hash-then-Sign Signatures

Commitments

  • Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice
  • Vector Commitments with Proofs of Smallness: Short Range Proofs and More
  • Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk
  • Oblivious Accumulators
  • Witness Encryption for Succinct Functional Commitments and Applications

Zero Knowledge Proofs

  • Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem
  • Ring/Module Learning with Errors Under Linear Leakage – Hardness and Applications
  • Succinct Verification of Compressed Sigma Protocols in the Updatable SRS Setting
  • Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees
  • Short Code-Based One-out-of-Many Proofs and Applications
  • Efficient KZG-Based Univariate Sum-Check and Lookup Argument
  • On Sigma-Protocols and (Packed) Black-Box Secret Sharing Schemes

Lattices and Applications

  • On Structure-Preserving Cryptography and Lattices
  • Tagged Chameleon Hash from Lattices and Application to Redactable Blockchain
  • SoK: Learning with Errors, Circular Security, and Fully Homomorphic Encryption