[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

Secure two-party threshold ECDSA from ECDSA assumptions

J Doerner, Y Kondi, E Lee… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used
schemes in deployed cryptography. Through its applications in code and binary …

The simplest protocol for oblivious transfer

T Chou, C Orlandi - Progress in Cryptology--LATINCRYPT 2015: 4th …, 2015 - Springer
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this
paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is …

High performance logistic regression for privacy-preserving genome analysis

M De Cock, R Dowsley, ACA Nascimento… - BMC Medical …, 2021 - Springer
Background In biomedical applications, valuable data is often split between owners who
cannot openly share the data because of privacy regulations and concerns. Training …

Compact, efficient and UC-secure isogeny-based oblivious transfer

YF Lai, SD Galbraith… - … Conference on the …, 2021 - Springer
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block
for almost all secure multiparty functionalities. The strongest security notion against …

Privacy-preserving classification of personal text messages with secure multi-party computation

D Reich, A Todoki, R Dowsley… - Advances in Neural …, 2019 - proceedings.neurips.cc
Classification of personal text messages has many useful applications in surveillance, e-
commerce, and mental health care, to name a few. Giving applications access to personal …

Composable oblivious pseudo-random functions via garbled circuits

S Faller, A Ottenhues, J Ottenhues - International Conference on …, 2023 - Springer
Abstract Oblivious Pseudo-Random Functions (OPRFs) are a central tool for building
modern protocols for authentication and distributed computation. For example, OPRFs …

Biometrics-authenticated key exchange for secure messaging

M Wang, K He, J Chen, Z Li, W Zhao, R Du - Proceedings of the 2021 …, 2021 - dl.acm.org
Secure messaging heavily relies on a session key negotiated by an Authenticated Key
Exchange (AKE) protocol. However, existing AKE protocols only verify the existence of a …

Endemic oblivious transfer

D Mansy, P Rindal - Proceedings of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
Oblivious Transfer has played a crucial role in the design of secure multi party computation.
Nevertheless, there are not many practical solutions that achieve simulation based security …

Privacy-preserving training of tree ensembles over continuous data

S Adams, C Choudhary, M De Cock, R Dowsley… - arXiv preprint arXiv …, 2021 - arxiv.org
Most existing Secure Multi-Party Computation (MPC) protocols for privacy-preserving
training of decision trees over distributed data assume that the features are categorical. In …