Security in quantum cryptography
C Portmann, R Renner - Reviews of Modern Physics, 2022 - APS
Quantum cryptography exploits principles of quantum physics for the secure processing of
information. A prominent example is secure communication, ie, the task of transmitting …
information. A prominent example is secure communication, ie, the task of transmitting …
Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general
V Lyubashevsky, NK Nguyen, M Plançon - Annual International …, 2022 - Springer
We present a much-improved practical protocol, based on the hardness of Module-SIS and
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …
Module-LWE problems, for proving knowledge of a short vector s→ satisfying A s→= t→ mod …
Practical non-interactive publicly verifiable secret sharing with thousands of parties
Non-interactive publicly verifiable secret sharing (PVSS) schemes enables (re-) sharing of
secrets in a decentralized setting in the presence of malicious parties. A recently proposed …
secrets in a decentralized setting in the presence of malicious parties. A recently proposed …
Two-round multiparty secure computation from minimal assumptions
S Garg, A Srinivasan - Journal of the ACM, 2022 - dl.acm.org
We provide new two-round multiparty secure computation (MPC) protocols in the dishonest
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …
Foundations of coin mixing services
Coin mixing services allow users to mix their cryptocurrency coins and thus enable
unlinkable payments in a way that prevents tracking of honest users' coins by both the …
unlinkable payments in a way that prevents tracking of honest users' coins by both the …
Sok: Mitigation of front-running in decentralized finance
Front-running is the malicious, and often illegal, act of both manipulating the order of
pending trades and injecting additional trades to make a profit at the cost of other users. In …
pending trades and injecting additional trades to make a profit at the cost of other users. In …
Succinct zero-knowledge batch proofs for set accumulators
Cryptographic accumulators are a common solution to proving information about a large set
S. They allow one to compute a short digest of S and short certificates of some of its basic …
S. They allow one to compute a short digest of S and short certificates of some of its basic …
Multiparty generation of an RSA modulus
We present a new multiparty protocol for the distributed generation of biprime RSA moduli,
with security against any subset of maliciously colluding parties assuming oblivious transfer …
with security against any subset of maliciously colluding parties assuming oblivious transfer …
Fast privacy-preserving text classification based on secure multiparty computation
We propose a privacy-preserving Naive Bayes classifier and apply it to the problem of
private text classification. In this setting, a party (Alice) holds a text message, while another …
private text classification. In this setting, a party (Alice) holds a text message, while another …
Revisiting the power of non-equivocation in distributed protocols
Trusted hardware and new computing platforms such as RDMA naturally provide a non-
equivocation abstraction. Previous works have shown that non-equivocation allows us to …
equivocation abstraction. Previous works have shown that non-equivocation allows us to …