[HTML][HTML] Private set intersection: A systematic literature review
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …
parties to compute a function on their private inputs, obtaining the output at the end and …
PrivHome: Privacy-preserving authenticated communication in smart home environment
A smart home enables users to access devices such as lighting, HVAC, temperature
sensors, and surveillance camera. It provides a more convenient and safe living …
sensors, and surveillance camera. It provides a more convenient and safe living …
Hash proof systems over lattices revisited
Abstract Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of
implicit arguments introduced by Cramer and Shoup at Eurocrypt'02. They have found many …
implicit arguments introduced by Cramer and Shoup at Eurocrypt'02. They have found many …
Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages
G Couteau, D Hartmann - Annual International Cryptology Conference, 2020 - Springer
We put forth a new framework for building pairing-based non-interactive zero-knowledge
(NIZK) arguments for a wide class of algebraic languages, which are an extension of linear …
(NIZK) arguments for a wide class of algebraic languages, which are an extension of linear …
Efficient fully structure-preserving signatures for large messages
J Groth - International Conference on the Theory and …, 2015 - Springer
We construct both randomizable and strongly existentially unforgeable structure-preserving
signatures for messages consisting of many group elements. To sign a message consisting …
signatures for messages consisting of many group elements. To sign a message consisting …
Efficient designated-verifier non-interactive zero-knowledge proofs of knowledge
We propose a framework for constructing efficient designated-verifier non-interactive zero-
knowledge proofs (DVNIZK) for a wide class of algebraic languages over abelian groups …
knowledge proofs (DVNIZK) for a wide class of algebraic languages over abelian groups …
Efficient Certificateless Signcryption in the standard model: Revisiting Luo and Wan's scheme from wireless personal communications (2018)
Certificateless public key cryptography (CL-PKC) promises a practical resolution in
establishing practical schemes, since it addresses two fundamental issues, namely the …
establishing practical schemes, since it addresses two fundamental issues, namely the …
A survey of secure computation using trusted execution environments
As an essential technology underpinning trusted computing, the trusted execution
environment (TEE) allows one to launch computation tasks on both on-and off-premises …
environment (TEE) allows one to launch computation tasks on both on-and off-premises …
Multimodal biometric identity based encryption
ND Sarier - Future Generation Computer Systems, 2018 - Elsevier
In this paper, we describe the first generic construction for multimodal biometric Identity
Based Encryption considering two distance measures at the same time. Current protocols for …
Based Encryption considering two distance measures at the same time. Current protocols for …
Strong asymmetric PAKE based on trapdoor CKEM
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow two parties that
share a password to establish a shared key in a way that is immune to offline attacks …
share a password to establish a shared key in a way that is immune to offline attacks …