Raziel: Private and verifiable smart contracts on blockchains

DC Sánchez - arXiv preprint arXiv:1807.09484, 2018 - arxiv.org
Raziel combines secure multi-party computation and proof-carrying code to provide privacy,
correctness and verifiability guarantees for smart contracts on blockchains. Effectively …

Metal: A metadata-hiding file-sharing system

W Chen, RA Popa - NDSS Symposium 2020, 2020 - par.nsf.gov
File-sharing systems like Dropbox offer insufficient privacy because a compromised server
can see the file contents in the clear. Although encryption can hide such contents from the …

Titanium: A metadata-hiding file-sharing system with malicious security

W Chen, T Hoang, J Guajardo, AA Yavuz - Network and Distributed …, 2022 - par.nsf.gov
End-to-end encrypted file-sharing systems enable users to share files without revealing the
file contents to the storage servers. However, the servers still learn metadata, including user …

DUPLO: unifying cut-and-choose for garbled circuits

V Kolesnikov, JB Nielsen, M Rosulek, N Trieu… - Proceedings of the …, 2017 - dl.acm.org
Cut-and-choose (CC) is the standard approach to making Yao's garbled circuit two-party
computation (2PC) protocol secure against malicious adversaries. Traditional cut-and …

How to circumvent the two-ciphertext lower bound for linear garbling schemes

C Kempka, R Kikuchi, K Suzuki - … on the Theory and Application of …, 2016 - Springer
At EUROCRYPT 2015, Zahur et al. argued that all linear, and thus, efficient, garbling
schemes need at least two k-bit elements to garble an AND gate with security parameter k …

Load-Balanced Server-Aided MPC in Heterogeneous Computing

Y Lu, B Zhang, K Ren - IEEE Transactions on Information …, 2024 - ieeexplore.ieee.org
Most existing MPC protocols consider the homogeneous setting, where all the MPC players
are assumed to have identical communication and computation resources. In practice, the …

[图书][B] Building Cryptographic Systems from Distributed Trust

W Chen - 2022 - search.proquest.com
Centralized systems are prone to data breaches, which may come from hackers and
malicious or compromised employees inside the company. The scale and prevalence of …

Reactive garbling: Foundation, instantiation, application

JB Nielsen, S Ranellucci - … 2016: 22nd International Conference on the …, 2016 - Springer
Garbled circuits is a cryptographic technique, which has been used among other things for
the construction of two and three-party secure computation, private function evaluation and …

ASIACRYPT 2016

JH Cheon, T Takagi - Springer
ASIACRYPT 2016, the 22nd Annual International Conference on Theory and Application of
Cryptology and Information Security, was held at InterContinental Hanoi Westlake Hotel in …

[PDF][PDF] Scalable Secure Computation

D Ram - 2016 - cris.csa.iisc.ac.in
Abstract Secure Multi-Party Computation (MPC) is the area of computing a function on the
inputs of several parties, without compromising the secrecy of their individual inputs. The …