To label, or not to label (in generic groups)

M Zhandry - Annual International Cryptology Conference, 2022 - Springer
Generic groups are an important tool for analyzing the feasibility and in-feasibility of group-
based cryptosystems. There are two distinct wide-spread versions of generic groups …

The many faces of schnorr

V Shoup - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Recently, a number of highly optimized threshold signing protocols for Schnorr signatures
have been proposed. While these proposals contain important new techniques, some of …

Generic-group lower bounds via reductions between geometric-search problems: With and without preprocessing

B Auerbach, C Hoffmann, G Pascual-Perez - Theory of Cryptography …, 2023 - Springer
The generic-group model (GGM) aims to capture algorithms working over groups of prime
order that only rely on the group operation, but do not exploit any additional structure given …

Preprocessing Security in Multiple Idealized Models with Applications to Schnorr Signatures and PSEC-KEM

J Blocki, S Lee - Cryptology ePrint Archive, 2025 - eprint.iacr.org
In modern cryptography, relatively few instantiations of foundational cryptographic primitives
are used across most cryptographic protocols. For example, elliptic curve groups are …

Truncator: time-space tradeoff of cryptographic primitives

F Baldimtsi, K Chalkias, P Chatzigiannis… - … Conference on Financial …, 2024 - Springer
We present mining-based techniques to reduce the size of various cryptographic outputs
without loss of security. Our approach can be generalized for multiple primitives, such as …

Computationally relaxed locally decodable codes, revisited

AR Block, J Blocki - 2023 IEEE International Symposium on …, 2023 - ieeexplore.ieee.org
We revisit computationally relaxed locally decodable codes (crLDCs)(Blocki et al., Trans. Inf.
Theory'21) and give two new constructions. Our first construction is a Hamming crLDC that is …

An Authorizable Threshold Signature Scheme for Secure Sharing and Mining of Power IoT Data

W Chen, XT Xu, C Hou, RX Gao, GL Si… - 2024 International …, 2024 - ieeexplore.ieee.org
The rapid development and wide popularity of electric power IoT has brought convenience
to people's daily lives. Comprehensive informatization and intelligent transformation of the …

Exploring the Composition of Coding Theory and Cryptography Through Secure Computation, Succinct Arguments, and Local Codes

AR Block - 2022 - search.proquest.com
We examine new ways in which coding theory and cryptography continue to be composed
together, and show that the composition of these two fields yield new constructions in the …