Estimating Incidental Collection in Foreign Intelligence Surveillance:{Large-Scale} Multiparty Private Set Intersection with Union and Sum

A Kulshrestha, J Mayer - 31st USENIX Security Symposium (USENIX …, 2022 - usenix.org
Section 702 of the Foreign Intelligence Surveillance Act authorizes US intelligence agencies
to intercept communications content without obtaining a warrant. While Section 702 requires …

Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC

A Abidin, E Pohle, B Preneel - European Symposium on Research in …, 2023 - Springer
Secure multi-party computation (MPC) enables multiple distrusting parties to compute a
function while keeping their respective inputs private. In a threshold implementation of a …

Fast Evaluation of S-boxes with Garbled Circuits

E Pohle, A Abidin, B Preneel - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Garbling schemes are vital primitives for privacy-preserving protocols and secure two-party
computation. This paper presents a projective garbling scheme that assigns values to wires …

Distributed Implementation of SM4 Block Cipher Algorithm Based on SPDZ Secure Multi-party Computation Protocol

X Ma, M Wang, Z Kang - International Conference of Pioneering Computer …, 2023 - Springer
SM4 is a block cipher algorithm among Chinese commercial cryptographic algorithms,
which is advanced in terms of efficiency and theoretical security and has become national …

Estimating Incidental Collection in Foreign Intelligence Surveillance: Large-Scale Multiparty Private Set Intersection with Union and Sum, 31st USENIX Security …

A Kulshrestha, J Mayer - Collections, 2022 - repository.library.georgetown.edu
Princeton Professor Jonathan Mayer (joint appt Computer Science and School of Public and
Int'l Affairs) and computer science doctoral candidate Anunay Kulshestha note that for more …

Анализ эффективности алгоритмов шифрования для безопасных многосторонних вычислений

АА Хлюпин, АО Саакян, ОВ Ниссенбаум - … молодых ученых. Вып. 21 …, 2023 - elib.utmn.ru
В этой работе были рассмотрены стандартизированные блочные шифры, а также
алгоритмы шифрования (псевдослучайные функции), специально разработанные для …

MAESTRO: Multi-party AES using Lookup Tables

H Morita, E Pohle, K Sadakane, P Scholl… - Cryptology ePrint …, 2024 - eprint.iacr.org
Secure multi-party computation (MPC) enables multiple distrusting parties to jointly compute
a function while keeping their inputs private. Computing the AES block cipher in MPC, where …