Riposte: An anonymous messaging system handling millions of users

H Corrigan-Gibbs, D Boneh… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is
the first such system, to our knowledge, that simultaneously protects against traffic-analysis …

Virtual black-box obfuscation for all circuits via generic graded encoding

Z Brakerski, GN Rothblum - Theory of Cryptography Conference, 2014 - Springer
We present a new general-purpose obfuscator for all polynomial size circuits. The
obfuscator uses graded encoding schemes, a generalization of multilinear maps. We prove …

Securely obfuscating re-encryption

S Hohenberger, GN Rothblum, A Shelat… - Theory of Cryptography …, 2007 - Springer
We present the first positive obfuscation result for a traditional cryptographic functionality.
This positive result stands in contrast to well-known negative impossibility results [BGI+ 01] …

Advances in cryptographic voting systems

B Adida - 2006 - dspace.mit.edu
Democracy depends on the proper administration of popular elections. Voters should
receive assurance that their intent was correctly captured and that all eligible votes were …

Additively Homomorphic Encryption with d-Operand Multiplications

CA Melchor, P Gaborit, J Herranz - … , Santa Barbara, CA, USA, August 15 …, 2010 - Springer
The search for encryption schemes that allow to evaluate functions (or circuits) over
encrypted data has attracted a lot of attention since the seminal work on this subject by …

A new secure arrangement for privacy-preserving data collection

J Song, Z Han, W Wang, J Chen, Y Liu - Computer Standards & Interfaces, 2022 - Elsevier
A big number of users' healthy data are necessary for the Internet of Things (IoT) healthcare.
Therefore, the institutions, which have access to more data can provide better medical …

Proofs of restricted shuffles

B Terelius, D Wikström - … : Third International Conference on Cryptology in …, 2010 - Springer
A proof of a shuffle is a zero-knowledge proof that one list of ciphertexts is a permutation and
re-encryption of another list of ciphertexts. We call a shuffle restricted if the permutation is …

On strong simulation and composable point obfuscation

N Bitansky, R Canetti - Journal of cryptology, 2014 - Springer
Abstract The Virtual Black Box (VBB) property for program obfuscators provides a strong
guarantee: anything computable by an efficient adversary, given the obfuscated program …

Obfuscation of hyperplane membership

R Canetti, GN Rothblum, M Varia - Theory of Cryptography: 7th Theory of …, 2010 - Springer
Previous work on program obfuscation gives strong negative results for general-purpose
obfuscators, and positive results for obfuscating simple functions such as equality testing …

[PDF][PDF] White-Box Cryptography.

B Wyseur - 2011 - whiteboxcrypto.com
White-Box Cryptography Cryptography: the basic principle Keys in cryptography
Cryptography is part of our modern life Example: i Page 1 5/03/2009 1 White-Box …