[HTML][HTML] Private set intersection: A systematic literature review

D Morales, I Agudo, J Lopez - Computer Science Review, 2023 - Elsevier
Abstract Secure Multi-party Computation (SMPC) is a family of protocols which allow some
parties to compute a function on their private inputs, obtaining the output at the end and …

PrivHome: Privacy-preserving authenticated communication in smart home environment

GS Poh, P Gope, J Ning - IEEE Transactions on Dependable …, 2019 - ieeexplore.ieee.org
A smart home enables users to access devices such as lighting, HVAC, temperature
sensors, and surveillance camera. It provides a more convenient and safe living …

Hash proof systems over lattices revisited

F Benhamouda, O Blazy, L Ducas, W Quach - … International Workshop on …, 2018 - Springer
Abstract Hash Proof Systems or Smooth Projective Hash Functions (SPHFs) are a form of
implicit arguments introduced by Cramer and Shoup at Eurocrypt'02. They have found many …

Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages

G Couteau, D Hartmann - Annual International Cryptology Conference, 2020 - Springer
We put forth a new framework for building pairing-based non-interactive zero-knowledge
(NIZK) arguments for a wide class of algebraic languages, which are an extension of linear …

Efficient fully structure-preserving signatures for large messages

J Groth - International Conference on the Theory and …, 2015 - Springer
We construct both randomizable and strongly existentially unforgeable structure-preserving
signatures for messages consisting of many group elements. To sign a message consisting …

Efficient designated-verifier non-interactive zero-knowledge proofs of knowledge

P Chaidos, G Couteau - Annual International Conference on the Theory …, 2018 - Springer
We propose a framework for constructing efficient designated-verifier non-interactive zero-
knowledge proofs (DVNIZK) for a wide class of algebraic languages over abelian groups …

Efficient Certificateless Signcryption in the standard model: Revisiting Luo and Wan's scheme from wireless personal communications (2018)

P Rastegari, W Susilo, M Dakhlalian - The Computer Journal, 2019 - academic.oup.com
Certificateless public key cryptography (CL-PKC) promises a practical resolution in
establishing practical schemes, since it addresses two fundamental issues, namely the …

A survey of secure computation using trusted execution environments

X Li, B Zhao, G Yang, T Xiang, J Weng… - arXiv preprint arXiv …, 2023 - arxiv.org
As an essential technology underpinning trusted computing, the trusted execution
environment (TEE) allows one to launch computation tasks on both on-and off-premises …

Multimodal biometric identity based encryption

ND Sarier - Future Generation Computer Systems, 2018 - Elsevier
In this paper, we describe the first generic construction for multimodal biometric Identity
Based Encryption considering two distance measures at the same time. Current protocols for …

Strong asymmetric PAKE based on trapdoor CKEM

T Bradley, S Jarecki, J Xu - Advances in Cryptology–CRYPTO 2019: 39th …, 2019 - Springer
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow two parties that
share a password to establish a shared key in a way that is immune to offline attacks …