R Cheng, F Zhang, J Kos, W He… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Smart contracts are applications that execute on blockchains. Today they manage billions of dollars in value and motivate visionary plans for pervasive blockchain deployment. While …
Isogeny-based assumptions have emerged as a viable option for quantum-secure cryptography. Recent works have shown how to build efficient (public-key) primitives from …
Z Liu, J Guo, KY Lam, J Zhao - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning (ML) has been widely recognized as an enabler of the global trend of digital transformation. With the increasing adoption of data-hungry machine learning …
M Chase, SSM Chow - Proceedings of the 16th ACM conference on …, 2009 - dl.acm.org
Attribute based encryption (ABE)[13] determines decryption ability based on a user's attributes. In a multi-authority ABE scheme, multiple attribute-authorities monitor different …
A pseudorandom function F:\mathcalK*\mathcalX→\mathcalY is said to be key homomorphic if given F (k 1, x) and F (k 2, x) there is an efficient algorithm to compute F (k 1⊕ k 2, x) …
This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is the first such system, to our knowledge, that simultaneously protects against traffic-analysis …
LKL Ng, SSM Chow - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
We studied 53 privacy-preserving neural-network papers in 2016-2022 based on cryptography (without trusted processors or differential privacy), 16 of which only use …
D Naor, M Naor, J Lotspiech - … in Cryptology—CRYPTO 2001: 21st Annual …, 2001 - Springer
We deal with the problem of a center sending a message to a group of users such that some subset of the users is considered revoked and should not be able to obtain the content of the …
Blockchains are gaining traction and acceptance, not just for cryptocurrencies, but increasingly as an architecture for distributed computing. In this work we seek solutions that …