PLASMA: Private, lightweight aggregated statistics against malicious adversaries
Private heavy-hitters is a data-collection task where multiple clients possess private bit
strings, and data-collection servers aim to identify the most popular strings without learning …
strings, and data-collection servers aim to identify the most popular strings without learning …
Round-optimal oblivious transfer and MPC from computational CSIDH
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and
multi-party computation (MPC) protocols from the computational CSIDH assumption–the …
multi-party computation (MPC) protocols from the computational CSIDH assumption–the …
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks
Secure Multiparty Computation (MPC) protocols enable secure evaluation of a circuit by
several parties, even in the presence of an adversary who maliciously corrupts all but one of …
several parties, even in the presence of an adversary who maliciously corrupts all but one of …
Triply adaptive uc nizk
Non-interactive zero knowledge (NIZK) enables proving the validity of NP statement without
leaking anything else. We study multi-instance NIZKs in the common reference string (CRS) …
leaking anything else. We study multi-instance NIZKs in the common reference string (CRS) …
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge
In the setting of subversion, an adversary tampers with the machines of the honest parties
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …
[图书][B] Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore …
M Tibouchi, H Wang - 2021 - books.google.com
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the
proceedings of the 27th International Conference on the Theory and Application of …
proceedings of the 27th International Conference on the Theory and Application of …
Secure Auctions in the Presence of Rational Adversaries
C Ganesh, B Kanukurthi, G Shankar - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Sealed bid auctions are used to allocate a resource among a set of interested parties.
Traditionally, auctions need the presence of a trusted auctioneer to whom the bidders …
Traditionally, auctions need the presence of a trusted auctioneer to whom the bidders …
Secure Vickrey Auctions with Rational Parties
C Ganesh, S Gupta, B Kanukurthi… - Proceedings of the 2024 on …, 2024 - dl.acm.org
In this work, we construct a second price (Vickrey) auction protocol (SPA), which does not
require any auctioneers and ensures total privacy in the presence of rational parties …
require any auctioneers and ensures total privacy in the presence of rational parties …
Reverse firewalls for adaptively secure MPC without setup
We study Multi-party computation (MPC) in the setting of subversion, where the adversary
tampers with the machines of honest parties. Our goal is to construct actively secure MPC …
tampers with the machines of honest parties. Our goal is to construct actively secure MPC …
Two-round adaptively secure MPC from isogenies, LPN, or CDH
N Alamati, H Montgomery, S Patranabis… - … Conference on the Theory …, 2021 - Springer
We present a new framework for building round-optimal (two-round) adaptively secure MPC.
We show that a relatively weak notion of OT that we call indistinguishability OT with receiver …
We show that a relatively weak notion of OT that we call indistinguishability OT with receiver …