A decade of lattice cryptography
C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …
Indistinguishability obfuscation from well-founded assumptions
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …
programs into unintelligible ones while preserving functionality. It is a fascinating and …
A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
Cryptographic group actions and applications
N Alamati, L De Feo, H Montgomery… - Advances in Cryptology …, 2020 - Springer
Isogeny-based assumptions have emerged as a viable option for quantum-secure
cryptography. Recent works have shown how to build efficient (public-key) primitives from …
cryptography. Recent works have shown how to build efficient (public-key) primitives from …
Efficient dropout-resilient aggregation for privacy-preserving machine learning
Machine learning (ML) has been widely recognized as an enabler of the global trend of
digital transformation. With the increasing adoption of data-hungry machine learning …
digital transformation. With the increasing adoption of data-hungry machine learning …
Threshold cryptosystems from threshold fully homomorphic encryption
We develop a general approach to adding a threshold functionality to a large class of (non-
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …
threshold) cryptographic schemes. A threshold functionality enables a secret key to be split …
Riposte: An anonymous messaging system handling millions of users
H Corrigan-Gibbs, D Boneh… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is
the first such system, to our knowledge, that simultaneously protects against traffic-analysis …
the first such system, to our knowledge, that simultaneously protects against traffic-analysis …
Can a public blockchain keep a secret?
Blockchains are gaining traction and acceptance, not just for cryptocurrencies, but
increasingly as an architecture for distributed computing. In this work we seek solutions that …
increasingly as an architecture for distributed computing. In this work we seek solutions that …
Cryptanalysis of the multilinear map over the integers
We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron,
Lepoint and Tibouchi (CLT). The attack relies on an adaptation of the so-called zeroizing …
Lepoint and Tibouchi (CLT). The attack relies on an adaptation of the so-called zeroizing …
Witness encryption and null-IO from evasive LWE
Witness encryption (WE) allows us to use an arbitrary NP statement x as a public key to
encrypt a message, and the witness w serves as a decryption key. Security ensures that …
encrypt a message, and the witness w serves as a decryption key. Security ensures that …