Secure multiparty computation from threshold encryption based on class groups

L Braun, I Damgård, C Orlandi - Annual International Cryptology …, 2023 - Springer
We construct the first actively-secure threshold version of the cryptosystem based on class
groups from the so-called CL framework (Castagnos and Laguillaumie, 2015). We show …

Distributed-prover interactive proofs

S Das, R Fernando, I Komargodski, E Shi… - Theory of Cryptography …, 2023 - Springer
Interactive proof systems enable a verifier with limited resources to decide an intractable
language (or compute a hard function) by communicating with a powerful but untrusted …

Vector Commitments with Proofs of Smallness: Short Range Proofs and More

B Libert - IACR International Conference on Public-Key …, 2024 - Springer
Vector commitment schemes are compressing commitments to vectors that make it possible
to succinctly open a commitment for individual vector positions without revealing anything …

Succinct verification of compressed sigma protocols in the updatable SRS setting

M Dutta, C Ganesh, N Jawalkar - IACR International Conference on Public …, 2024 - Springer
We propose protocols in the Compressed Sigma Protocol framework that achieve a succinct
verifier. Towards this, we construct a new inner product argument and cast it in the …

[PDF][PDF] Vector Commitments With Short Proofs of Smallness.

B Libert - IACR Cryptol. ePrint Arch., 2023 - core.ac.uk
Vector commitment schemes are compressing commitments to vectors that make it possible
to succinctly open a commitment for individual vector positions without revealing anything …

Formal Verification of the Sumcheck Protocol

AG Bosshard, J Bootle, C Sprenger - arXiv preprint arXiv:2402.06093, 2024 - arxiv.org
The sumcheck protocol, introduced in 1992, is an interactive proof which is a key component
of many probabilistic proof systems in computational complexity theory and cryptography …

: One-shot Private Aggregation with Single Client Interaction and its Applications to Federated Learning

H Karthikeyan, A Polychroniadou - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Our work aims to minimize interaction in secure computation due to the high cost and
challenges associated with communication rounds, particularly in scenarios with many …

[PDF][PDF] A Federated Learning Framework with Blockchain-Based Auditable Participant Selection.

H Zeng, M Zhang, T Liu, A Yang - Computers, Materials & …, 2024 - cdn.techscience.cn
Federated learning is an important distributed model training technique in Internet of Things
(IoT), in which participant selection is a key component that plays a role in improving training …

Multivariate Multi-Polynomial Commitment and its Applications

X Yang, C Zhang, M Ryan, G Meng - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We introduce and formally define Multivariate Multi-Polynomial (MMP) commitment, a
commitment scheme on multiple multivariate polynomials, and illustrate the concept with an …

Improved SNARK Frontend for Highly Repetitive Computations

S Sridhar, Y Zhang - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Modern SNARK designs usually feature a frontend-backend paradigm: The frontend
compiles a user's program into some equivalent circuit representation, while the backend …