Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric
Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui and Björn Tackmann
[presentation]
Attestation Waves: Platform Trust via Remote Power Analysis
Ignacio M. Delgado-Lozano, Macarena C. Martínez-Rodríguez, Alexandros Bakas, Billy Brumley and Antonis Michalas
[presentation]
BlindOR: An Efficient Lattice-Based Blind Signature Scheme from OR-Proofs
Nabil Alkeilani Alkadri, Patrick Harasser and Christian Janson
[presentation]
Countermeasures against Backdoor Attacks towards Malware Detectors
Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji and Shinsaku Kiyomoto
[presentation]
Cross-Domain Attribute-Based Access Control Encryption
Mahdi Sedaghat and Bart Preneel
[presentation]
Efficient Threshold-Optimal ECDSA
Michaella Pettit
[presentation]
FO-like Combiners and Hybrid Post-Quantum Cryptography
Loïs Huguenin-Dumittan and Serge Vaudenay
[presentation]
Free By Design: On the Feasibility Of Free-Riding Attacks Against Zero-Rated Services
Julian Fietkau, David Pascal Runge and Jean-Pierre Seifert
[presentation]
Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions
Nolan Miranda, Foo Yee Yeo and Vipin Singh Sehrawat
[presentation]
GMMT: A Revocable Group Merkle Multi-Tree Signature Scheme
Mahmoud Yehia, Riham Altawy and T. Aaron Gulliver
[presentation]
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
Martin Hell, Thomas Johansson, Alexander Maximov, Willi Meier and Hirotaka Yoshida
[presentation]
How (not) to Achieve both Coercion Resistance and Cast as Intended Verifiability in Remote eVoting (short paper)
Tamara Finogina, Javier Herranz and Enrique Larraia
[presentation]
How Distance-bounding can Detect Internet Traffic Hijacking
Ghada Arfaoui, Gildas Avoine, Olivier Gimenez and Jacques Traoré
[presentation]
Issuer-Hiding Attribute-Based Credentials
Jan Bobolz, Fabian Eidens, Stephan Krenn, Sebastian Ramacher and Kai Samelin
[presentation]
Linear-time oblivious permutations for SPDZ (short paper)
Peeter Laud
[presentation]
On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem
Anaëlle Le Dévéhat, Hiroki Shizuya and Shingo Hasegawa
[presentation]
Partition Oracles from Weak Key Forgeries
Marcel Armour and Carlos Cid
[presentation]
Practical Continuously Non-Malleable Randomness Encoders in the Random Oracle Model
Antonio Faonio
[presentation]
Practical Privacy-Preserving Face Identification based on Function-Hiding Functional Encryption (short paper)
Alberto Ibarrondo, Hervé Chabanne and Melek Önen
[presentation]
Report and Trace Ring Signatures
Ashley Fraser and Elizabeth A. Quaglia
[presentation]
Selectively Linkable Group Signatures – Stronger Security and Preserved Verifiability
Ashley Fraser, Lydia Garms and Anja Lehmann
[presentation]
SoK: Secure Memory Allocation
Bojan Novković and Marin Golub
[presentation]
Subversion-Resistant Quasi-Adaptive NIZK and Applications to Modular zk-SNARKs
Behzad Abdolmaleki and Daniel Slamanig
[presentation]
THC: Practical and Cost-Effective Verification of Delegated Computation
Pablo Rauzy and Ali Nehme
[presentation]
The Matrix Reloaded: Multiplication Strategies in FrodoKEM
Joppe W. Bos, Maximilian Ofner, Joost Renes, Tobias Schneider and Christine van Vredendaal
[presentation]
Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model
Karim Baghery and Mahdi Sedaghat
[presentation]
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training
Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto and Nozomu Togawa
[presentation]
Towards Quantum Large-Scale Password Guessing on Real-World Distributions
Markus Dürmuth, Maximilian Golla, Philipp Markert, Alexander May and Lars Schlieper
[presentation]