We construct the first actively-secure threshold version of the cryptosystem based on class groups from the so-called CL framework (Castagnos and Laguillaumie, 2015). We show …
L Xu, X Wu, X Zhang - Proceedings of the 7th ACM symposium on …, 2012 - dl.acm.org
We propose CL-PRE, a certificateless proxy re-encryption scheme for secure data sharing with public cloud, which leverages maximal cloud resources to reduce the computing and …
Side-channel analysis and fault-injection attacks are known as major threats to any cryptographic implementation. Hardening cryptographic implementations with appropriate …
H Chen, R Cramer - Annual International Cryptology Conference, 2006 - Springer
We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme (LSSS) …
H Lipmaa - Advances in Cryptology-ASIACRYPT 2013: 19th …, 2013 - Springer
Abstract Gennaro, Gentry, Parno and Raykova proposed an efficient NIZK argument for Circuit-SAT, based on non-standard tools like conscientious and quadratic span programs …
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case of …
The general adversary bound is a semi-definite program (SDP) that lower-bounds the quantum query complexity of a function. We turn this lower bound into an upper bound, by …
BW Reichardt, R Spalek - Proceedings of the fortieth annual ACM …, 2008 - dl.acm.org
We give a quantum algorithm for evaluating formulas over an extended gate set, including all two-and three-bit binary gates (eg, NAND, 3-majority). The algorithm is optimal on read …
A threshold public key encryption protocol is a public key system where the private key is distributed among n different servers. It offers high security since no single server is …