{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation

A Patra, T Schneider, A Suresh, H Yalame - 30th USENIX Security …, 2021 - usenix.org
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …

Ciphers for MPC and FHE

MR Albrecht, C Rechberger, T Schneider… - Advances in Cryptology …, 2015 - Springer
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …

An empirical study of a decentralized identity wallet: Usability, security, and perspectives on user control

M Korir, S Parkin, P Dunphy - … symposium on usable privacy and security …, 2022 - usenix.org
User-centric digital identity initiatives are emerging with a mission to shift control over online
identity disclosures to the individual. However, there is little representation of prospective …

[HTML][HTML] A decentralized digital identity architecture

G Goodell, T Aste - Frontiers in Blockchain, 2019 - frontiersin.org
Current architectures to validate, certify, and manage identity are based on centralised, top-
down approaches that rely on trusted authorities and third-party operators. We approach the …

Who am i? secure identity registration on distributed ledgers

S Azouvi, M Al-Bassam, S Meiklejohn - … , DPM 2017 and CBT 2017, Oslo …, 2017 - Springer
Bitcoin is a decentralized cryptocurrency that uses a ledger (or “blockchain”) to keep track of
the transactions made between its users. Because it is a fully decentralized system and …

Protection of confidentiality, privacy and financial fairness in a blockchain based decentralized identity management system

S Chari, H Gunasinghe, A Kundu, KK Singh… - US Patent …, 2020 - Google Patents
A processor-implemented method improves security in a blockchain network of devices,
which supports a blockchain, by protecting security, privacy, financial fairness, and secure …

SynCirc: efficient synthesis of depth-optimized circuits for secure computation

A Patra, T Schneider, A Suresh… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Secure Multi-party Computation (MPC) allows to securely compute on private data. To make
MPC practical, logic synthesis can be used to automatically translate a description of the …

Privacy-preserving identity asset exchange

SN Chari, H Gunasinghe, A Kundu, KK Singh… - US Patent …, 2021 - Google Patents
(57) ABSTRACT A processor-implemented method facilitates identity exchange in a
decentralized setting. A first system performs a pseudonymous handshake with a second …

PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.

H Gunasinghe, A Kundu, E Bertino… - The World Wide Web …, 2019 - dl.acm.org
User's digital identity information has privacy and security requirements. Privacy
requirements include confidentiality of the identity information itself, anonymity of those who …

Future crime

SD Johnson, P Ekblom, G Laycock… - … handbook of crime …, 2018 - taylorfrancis.com
This chapter discusses how the theories that underpin much research in crime science can
contribute to thinking about the future and how they were used to identify emerging …