scientific article

From MaRDI portal
Publication:2724587

zbMath0987.94032MaRDI QIDQ2724587

Mads Jurik, Ivan B. Damgård

Publication date: 23 June 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Efficient set intersection with simulation-based securityNew Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their ApplicationsEfficient RSA Key Generation and Threshold Paillier in the Two-Party SettingCounterexamples to new circular security assumptions underlying iOLarge message homomorphic secret sharing from DCR and applicationsPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemRate-limited secure function evaluationAlgebraic secret sharing using privacy homomorphisms for IoT-based healthcare systemsPrivacy-preserving algorithms for distributed mining of frequent itemsetsSecure multiparty computation with free branchingOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesCompressible FHE with applications to PIRA verifiable secret shuffle of homomorphic encryptionsPrivacy-preserving Krawtchouk moment feature extraction over encrypted image dataCryptographic algorithms for privacy-preserving online applicationsPaillier-based publicly verifiable (non-interactive) secret sharingA generic construction of tightly secure signatures in the multi-user settingNew ways to garble arithmetic circuitsTransparent batchable time-lock puzzles and applications to Byzantine consensusEfficient KDM-CCA Secure Public-Key Encryption for Polynomial FunctionsZero-knowledge arguments for subverted RSA groupsHow to verifiably encrypt many bits for an election?Efficient RSA key generation and threshold Paillier in the two-party settingRate-1 incompressible encryption from standard assumptionsChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextThreshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)Cumulatively all-lossy-but-one trapdoor functions from standard assumptionsPublic-Key Cryptosystems with Primitive Power Roots of UnityFully-Simulatable Oblivious Set TransferAn algebraic framework for silent preprocessing with trustless setup and active securityZero-knowledge range arguments for signed fractional numbers from latticesGroup homomorphic encryption: characterizations, impossibility results, and applicationsMore constructions of lossy and correlation-secure trapdoor functionsEfficient set operations in the presence of malicious adversariesAsynchronous Multi-Party Computation with Quadratic CommunicationLaconic private set intersection and applicationsTwo Generic Constructions of Probabilistic Cryptosystems and Their ApplicationsAn RSA-Based (t,n) Threshold Proxy Signature Scheme without Any Trusted CombinerNew Communication-Efficient Oblivious Transfer Protocols Based on PairingsHypercubes and Private Information RetrievalQuadratic Error Minimization in a Distributed Environment with Privacy PreservingBenaloh’s Dense Probabilistic Encryption RevisitedAll-but-many encryptionCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsCircuit-Private Multi-key FHEScalable Multi-party Private Set-IntersectionTwo methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequencesCandidate iO from homomorphic encryption schemesEfficient Binary Conversion for Paillier Encrypted ValuesOblivious DFA evaluation on joint input and its applicationsOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesSecure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious AdversariesCommunication Optimal Tardos-Based Asymmetric FingerprintingLinearly Homomorphic Encryption from $$\mathsf {DDH}$$Equivocal Blind Signatures and Adaptive UC-SecuritySuperTrust – A Secure and Efficient Framework for Handling Trust in Super Peer NetworksFast secure two-party ECDSA signingUniversally Verifiable Multiparty Computation from Threshold Homomorphic CryptosystemsA communication-efficient private matching scheme in client-server modelRound-optimal secure multi-party computationOnion ORAM: A Constant Bandwidth Blowup Oblivious RAMPreserving worker privacy in crowdsourcingCommunication-Efficient Private Protocols for Longest Common SubsequencePrivate multiparty sampling and approximation of vector combinationsCandidate iO from homomorphic encryption schemesThreshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet SecurityBetter Preprocessing for Secure Multiparty ComputationSimulatable Adaptive Oblivious Transfer with Statistical Receiver’s PrivacyGeneral Construction of Chameleon All-But-One Trapdoor FunctionsHybrid commitments and their applications to zero-knowledge proof systemsNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsA geometric approach to homomorphic secret sharingBETA: biometric-enabled threshold authenticationFilling the gap between voters and cryptography in e-votingOn Constructing Homomorphic Encryption Schemes from Coding TheoryEfficiency Limitations for Σ-Protocols for Group HomomorphismsThreshold Homomorphic Encryption in the Universally Composable Cryptographic LibraryA Tamper-Evident Voting Machine Resistant to Covert ChannelsSecurity analysis and improvement of a double-trapdoor encryption schemeA research on new public-key encryption schemesOptimally Sound Sigma Protocols Under DCRAA Simpler Rate-Optimal CPIR ProtocolIncompressible encodingsAlways have a backup plan: fully secure synchronous MPC with asynchronous fallbackTwo-sided malicious security for private intersection-sum with cardinality