Talks

Multi-Theorem Preprocessing NIZK from LWE

Access Control Encryption for General Policies from Standard Assumptions

Threshold Cryptosystems From Threshold Fully Homomorphic Encryption

Watermarking Cryptographic Functionalities from Standard Lattice Assumptions

Lattice-Based DAPS and Generalizations: Self-Enforcement in Signature Schemes

Private Puncturable PRFs from Standard Lattice Assumptions

Function-Hiding Inner Product Encryption is Practical