Published in: LIPIcs, Volume 282, 5th Conference on Advances in Financial Technologies (AFT 2023)
Wilson D. Nguyen, Dan Boneh, and Srinath Setty. Revisiting the Nova Proof System on a Cycle of Curves. In 5th Conference on Advances in Financial Technologies (AFT 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 282, pp. 18:1-18:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
@InProceedings{nguyen_et_al:LIPIcs.AFT.2023.18, author = {Nguyen, Wilson D. and Boneh, Dan and Setty, Srinath}, title = {{Revisiting the Nova Proof System on a Cycle of Curves}}, booktitle = {5th Conference on Advances in Financial Technologies (AFT 2023)}, pages = {18:1--18:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-303-4}, ISSN = {1868-8969}, year = {2023}, volume = {282}, editor = {Bonneau, Joseph and Weinberg, S. Matthew}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2023.18}, URN = {urn:nbn:de:0030-drops-192076}, doi = {10.4230/LIPIcs.AFT.2023.18}, annote = {Keywords: Cryptographic Protocols, Recursive Proof Systems, Folding, Vulnerability} }
Published in: LIPIcs, Volume 282, 5th Conference on Advances in Financial Technologies (AFT 2023)
Maryam Bahrani, Pranav Garimidi, and Tim Roughgarden. When Bidders Are DAOs. In 5th Conference on Advances in Financial Technologies (AFT 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 282, pp. 21:1-21:21, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
@InProceedings{bahrani_et_al:LIPIcs.AFT.2023.21, author = {Bahrani, Maryam and Garimidi, Pranav and Roughgarden, Tim}, title = {{When Bidders Are DAOs}}, booktitle = {5th Conference on Advances in Financial Technologies (AFT 2023)}, pages = {21:1--21:21}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-303-4}, ISSN = {1868-8969}, year = {2023}, volume = {282}, editor = {Bonneau, Joseph and Weinberg, S. Matthew}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2023.21}, URN = {urn:nbn:de:0030-drops-192108}, doi = {10.4230/LIPIcs.AFT.2023.21}, annote = {Keywords: Auctions, DAOs} }
Published in: LIPIcs, Volume 282, 5th Conference on Advances in Financial Technologies (AFT 2023)
Dan Boneh, Aditi Partap, and Lior Rotem. Post-Quantum Single Secret Leader Election (SSLE) from Publicly Re-Randomizable Commitments. In 5th Conference on Advances in Financial Technologies (AFT 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 282, pp. 26:1-26:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
@InProceedings{boneh_et_al:LIPIcs.AFT.2023.26, author = {Boneh, Dan and Partap, Aditi and Rotem, Lior}, title = {{Post-Quantum Single Secret Leader Election (SSLE) from Publicly Re-Randomizable Commitments}}, booktitle = {5th Conference on Advances in Financial Technologies (AFT 2023)}, pages = {26:1--26:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-303-4}, ISSN = {1868-8969}, year = {2023}, volume = {282}, editor = {Bonneau, Joseph and Weinberg, S. Matthew}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2023.26}, URN = {urn:nbn:de:0030-drops-192158}, doi = {10.4230/LIPIcs.AFT.2023.26}, annote = {Keywords: Consensus, Leader Election, Post-Quantum, Lattice Cryptography, Blockchain} }
Published in: LIPIcs, Volume 282, 5th Conference on Advances in Financial Technologies (AFT 2023)
Ertem Nusret Tas and Dan Boneh. Vector Commitments with Efficient Updates. In 5th Conference on Advances in Financial Technologies (AFT 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 282, pp. 29:1-29:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
@InProceedings{tas_et_al:LIPIcs.AFT.2023.29, author = {Tas, Ertem Nusret and Boneh, Dan}, title = {{Vector Commitments with Efficient Updates}}, booktitle = {5th Conference on Advances in Financial Technologies (AFT 2023)}, pages = {29:1--29:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-303-4}, ISSN = {1868-8969}, year = {2023}, volume = {282}, editor = {Bonneau, Joseph and Weinberg, S. Matthew}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2023.29}, URN = {urn:nbn:de:0030-drops-192184}, doi = {10.4230/LIPIcs.AFT.2023.29}, annote = {Keywords: Vector commitments, stateless clients} }
Published in: LIPIcs, Volume 218, 3rd Symposium on Foundations of Responsible Computing (FORC 2022)
Kunal Talwar. Differential Secrecy for Distributed Data and Applications to Robust Differentially Secure Vector Summation. In 3rd Symposium on Foundations of Responsible Computing (FORC 2022). Leibniz International Proceedings in Informatics (LIPIcs), Volume 218, pp. 7:1-7:16, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2022)
@InProceedings{talwar:LIPIcs.FORC.2022.7, author = {Talwar, Kunal}, title = {{Differential Secrecy for Distributed Data and Applications to Robust Differentially Secure Vector Summation}}, booktitle = {3rd Symposium on Foundations of Responsible Computing (FORC 2022)}, pages = {7:1--7:16}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-226-6}, ISSN = {1868-8969}, year = {2022}, volume = {218}, editor = {Celis, L. Elisa}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.FORC.2022.7}, URN = {urn:nbn:de:0030-drops-165302}, doi = {10.4230/LIPIcs.FORC.2022.7}, annote = {Keywords: Zero Knowledge, Secure Summation, Differential Privacy} }
Published in: LIPIcs, Volume 215, 13th Innovations in Theoretical Computer Science Conference (ITCS 2022)
Zvika Brakerski and Vinod Vaikuntanathan. Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE. In 13th Innovations in Theoretical Computer Science Conference (ITCS 2022). Leibniz International Proceedings in Informatics (LIPIcs), Volume 215, pp. 28:1-28:20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2022)
@InProceedings{brakerski_et_al:LIPIcs.ITCS.2022.28, author = {Brakerski, Zvika and Vaikuntanathan, Vinod}, title = {{Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE}}, booktitle = {13th Innovations in Theoretical Computer Science Conference (ITCS 2022)}, pages = {28:1--28:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-217-4}, ISSN = {1868-8969}, year = {2022}, volume = {215}, editor = {Braverman, Mark}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2022.28}, URN = {urn:nbn:de:0030-drops-156243}, doi = {10.4230/LIPIcs.ITCS.2022.28}, annote = {Keywords: Theoretical Cryptography, Broadcast Encryption, Attribute-Based Encryption, Lattice-Based Cryptography} }
Published in: Dagstuhl Seminar Proceedings, Volume 9141, Web Application Security (2010)
Dan Boneh, Ulfar Erlingsson, Martin Johns, and Benjamin Livshits. 09141 Abstracts Collection – Web Application Security. In Web Application Security. Dagstuhl Seminar Proceedings, Volume 9141, pp. 1-16, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
@InProceedings{boneh_et_al:DagSemProc.09141.1, author = {Boneh, Dan and Erlingsson, Ulfar and Johns, Martin and Livshits, Benjamin}, title = {{09141 Abstracts Collection – Web Application Security}}, booktitle = {Web Application Security}, pages = {1--16}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2010}, volume = {9141}, editor = {Dan Boneh and Ulfar Erlingsson and Martin Johns and Benjamin Livshits}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.09141.1}, URN = {urn:nbn:de:0030-drops-27263}, doi = {10.4230/DagSemProc.09141.1}, annote = {Keywords: Web applications, Security, Ajax, Web 2.0, Analysis for security, Browser design, Distributed applications} }
Published in: Dagstuhl Seminar Proceedings, Volume 9141, Web Application Security (2010)
Dan Boneh, Ulfar Erlingsson, Martin Johns, and Benjamin Livshits. 09141 Executive Summary – Web Application Security. In Web Application Security. Dagstuhl Seminar Proceedings, Volume 9141, pp. 1-11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
@InProceedings{boneh_et_al:DagSemProc.09141.2, author = {Boneh, Dan and Erlingsson, Ulfar and Johns, Martin and Livshits, Benjamin}, title = {{09141 Executive Summary – Web Application Security}}, booktitle = {Web Application Security}, pages = {1--11}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2010}, volume = {9141}, editor = {Dan Boneh and Ulfar Erlingsson and Martin Johns and Benjamin Livshits}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.09141.2}, URN = {urn:nbn:de:0030-drops-27258}, doi = {10.4230/DagSemProc.09141.2}, annote = {Keywords: Web applications, Security, Ajax, Web 2.0, Analysis for security, Browser design, Distributed applications} }
Published in: Dagstuhl Seminar Proceedings, Volume 7381, Cryptography (2008)
Johannes Blömer, Dan Boneh, Ronald Cramer, and Ueli Maurer. 07381 Abstracts Collection – Cryptography. In Cryptography. Dagstuhl Seminar Proceedings, Volume 7381, pp. 1-19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{blomer_et_al:DagSemProc.07381.1, author = {Bl\"{o}mer, Johannes and Boneh, Dan and Cramer, Ronald and Maurer, Ueli}, title = {{07381 Abstracts Collection – Cryptography}}, booktitle = {Cryptography}, pages = {1--19}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {7381}, editor = {Johannes Bl\"{o}mer and Dan Boneh and Ronald Cramer and Ueli Maurer}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07381.1}, URN = {urn:nbn:de:0030-drops-12935}, doi = {10.4230/DagSemProc.07381.1}, annote = {Keywords: Cryptography, information security, public-key cryptography, cryptographic protocols, security proofs} }
Published in: Dagstuhl Seminar Proceedings, Volume 7381, Cryptography (2008)
Johannes Blömer, Dan Boneh, Ronald Cramer, and Ueli Maurer. 07381 Executive Summary - Cryptography. In Cryptography. Dagstuhl Seminar Proceedings, Volume 7381, pp. 1-2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{blomer_et_al:DagSemProc.07381.2, author = {Bl\"{o}mer, Johannes and Boneh, Dan and Cramer, Ronald and Maurer, Ueli}, title = {{07381 Executive Summary - Cryptography}}, booktitle = {Cryptography}, pages = {1--2}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {7381}, editor = {Johannes Bl\"{o}mer and Dan Boneh and Ronald Cramer and Ueli Maurer}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07381.2}, URN = {urn:nbn:de:0030-drops-12928}, doi = {10.4230/DagSemProc.07381.2}, annote = {Keywords: Cryptography, information security, public-key cryptography, cryptographic protocols, security proofs} }
Feedback for Dagstuhl Publishing