Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In our proposal, a Multiple-Authorities Key-Policy Attribute-Based Encryption scheme is const...
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical ap...
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Da...
Abstract. We explore the feasibility of applying SAT solvers to optimizing implementations of small functions such as S-boxes for multiple optimization criteria, e.g., the number o...
Goldreich and Izsak (Theory of Computing, 2012) initiated the research on understanding the role of negations in circuits implementing cryptographic primitives, notably, consideri...
Douglas Miller, Adam Scrivener, Jesse Stern, Muthu...