A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts

R Cheng, F Zhang, J Kos, W He… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Smart contracts are applications that execute on blockchains. Today they manage billions of
dollars in value and motivate visionary plans for pervasive blockchain deployment. While …

Cryptographic group actions and applications

N Alamati, L De Feo, H Montgomery… - Advances in Cryptology …, 2020 - Springer
Isogeny-based assumptions have emerged as a viable option for quantum-secure
cryptography. Recent works have shown how to build efficient (public-key) primitives from …

Efficient dropout-resilient aggregation for privacy-preserving machine learning

Z Liu, J Guo, KY Lam, J Zhao - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning (ML) has been widely recognized as an enabler of the global trend of
digital transformation. With the increasing adoption of data-hungry machine learning …

Improving privacy and security in multi-authority attribute-based encryption

M Chase, SSM Chow - Proceedings of the 16th ACM conference on …, 2009 - dl.acm.org
Attribute based encryption (ABE)[13] determines decryption ability based on a user's
attributes. In a multi-authority ABE scheme, multiple attribute-authorities monitor different …

Key homomorphic PRFs and their applications

D Boneh, K Lewi, H Montgomery… - Annual Cryptology …, 2013 - Springer
A pseudorandom function F:\mathcalK*\mathcalX→\mathcalY is said to be key homomorphic
if given F (k 1, x) and F (k 2, x) there is an efficient algorithm to compute F (k 1⊕ k 2, x) …

Riposte: An anonymous messaging system handling millions of users

H Corrigan-Gibbs, D Boneh… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is
the first such system, to our knowledge, that simultaneously protects against traffic-analysis …

SoK: cryptographic neural-network computation

LKL Ng, SSM Chow - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
We studied 53 privacy-preserving neural-network papers in 2016-2022 based on
cryptography (without trusted processors or differential privacy), 16 of which only use …

Revocation and tracing schemes for stateless receivers

D Naor, M Naor, J Lotspiech - … in Cryptology—CRYPTO 2001: 21st Annual …, 2001 - Springer
We deal with the problem of a center sending a message to a group of users such that some
subset of the users is considered revoked and should not be able to obtain the content of the …

Can a public blockchain keep a secret?

F Benhamouda, C Gentry, S Gorbunov, S Halevi… - Theory of Cryptography …, 2020 - Springer
Blockchains are gaining traction and acceptance, not just for cryptocurrencies, but
increasingly as an architecture for distributed computing. In this work we seek solutions that …