Author of the publication

Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key Transparency.

, , , , , , and . ASIACRYPT (3), volume 13793 of Lecture Notes in Computer Science, page 547-580. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Extractors: How to Generate Strong Keys from Biometrcis and Other Noisy Data, , , and . (2008)Extracting Randomness from Extractor-Dependent Sources., , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 313-342. Springer, (2020)Security with Functional Re-encryption from CPA., , and . TCC (2), volume 14370 of Lecture Notes in Computer Science, page 279-305. Springer, (2023)Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited., , and . EUROCRYPT (1), volume 14004 of Lecture Notes in Computer Science, page 86-116. Springer, (2023)Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited., , and . IACR Cryptol. ePrint Arch., (2021)Updatable Public Key Encryption in the Standard Model., , and . IACR Cryptol. ePrint Arch., (2022)T₅: Hashing Five Inputs with Three Compression Calls., , , and . ITC, volume 199 of LIPIcs, page 24:1-24:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Non-Malleable Codes from Additive Combinatorics., , and . SIAM J. Comput., 47 (2): 524-546 (2018)The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol., , and . EUROCRYPT (1), volume 11476 of Lecture Notes in Computer Science, page 129-158. Springer, (2019)Multicast Key Agreement, Revisited., , and . IACR Cryptol. ePrint Arch., (2021)