Sok: General purpose compilers for secure multi-party computation

M Hastings, B Hemenway, D Noble… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …

Secure multiparty computation from threshold encryption based on class groups

L Braun, I Damgård, C Orlandi - Annual International Cryptology …, 2023 - Springer
We construct the first actively-secure threshold version of the cryptosystem based on class
groups from the so-called CL framework (Castagnos and Laguillaumie, 2015). We show …

CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud

L Xu, X Wu, X Zhang - Proceedings of the 7th ACM symposium on …, 2012 - dl.acm.org
We propose CL-PRE, a certificateless proxy re-encryption scheme for secure data sharing
with public cloud, which leverages maximal cloud resources to reduce the computing and …

ParTI–towards combined hardware countermeasures against side-channel and fault-injection attacks

T Schneider, A Moradi, T Güneysu - … , Santa Barbara, CA, USA, August 14 …, 2016 - Springer
Side-channel analysis and fault-injection attacks are known as major threats to any
cryptographic implementation. Hardening cryptographic implementations with appropriate …

Algebraic geometric secret sharing schemes and secure multi-party computations over small fields

H Chen, R Cramer - Annual International Cryptology Conference, 2006 - Springer
We introduce algebraic geometric techniques in secret sharing and in secure multi-party
computation (MPC) in particular. The main result is a linear secret sharing scheme (LSSS) …

Succinct non-interactive zero knowledge arguments from span programs and linear error-correcting codes

H Lipmaa - Advances in Cryptology-ASIACRYPT 2013: 19th …, 2013 - Springer
Abstract Gennaro, Gentry, Parno and Raykova proposed an efficient NIZK argument for
Circuit-SAT, based on non-standard tools like conscientious and quadratic span programs …

Secure arithmetic computation with no honest majority

Y Ishai, M Prabhakaran, A Sahai - Theory of Cryptography: 6th Theory of …, 2009 - Springer
We study the complexity of securely evaluating arithmetic circuits over finite rings. This
question is motivated by natural secure computation tasks. Focusing mainly on the case of …

Span programs and quantum query complexity: The general adversary bound is nearly tight for every boolean function

BW Reichardt - 2009 50th Annual IEEE Symposium on …, 2009 - ieeexplore.ieee.org
The general adversary bound is a semi-definite program (SDP) that lower-bounds the
quantum query complexity of a function. We turn this lower bound into an upper bound, by …

Span-program-based quantum algorithm for evaluating formulas

BW Reichardt, R Spalek - Proceedings of the fortieth annual ACM …, 2008 - dl.acm.org
We give a quantum algorithm for evaluating formulas over an extended gate set, including
all two-and three-bit binary gates (eg, NAND, 3-majority). The algorithm is optimal on read …

Threshold Linearly Homomorphic Encryption on 

G Castagnos, F Laguillaumie, I Tucker - … on the Theory and Application of …, 2022 - Springer
A threshold public key encryption protocol is a public key system where the private key is
distributed among n different servers. It offers high security since no single server is …