Efficient Zero-Knowledge Arguments For Paillier Cryptosystem

B Gong, WF Lau, MH Au, R Yang, H Xue… - 2024 IEEE Symposium …, 2024 - computer.org
We present an efficient zero-knowledge argument of knowledge system customized for the
Paillier cryptosystem. Our system enjoys sublinear proof size, low verification cost, and …

A theory of composition for differential obliviousness

M Zhou, E Shi, THH Chan, S Maimon - … on the Theory and Applications of …, 2023 - Springer
Differential obliviousness (DO) is a privacy notion which guarantees that the access patterns
of a program satisfies differential privacy. Differential obliviousness was studied in a …

Multi-client inner product encryption: function-hiding instantiations without random oracles

E Shi, N Vanjani - IACR International Conference on Public-Key …, 2023 - Springer
Abstract In a Multi-Client Functional Encryption (MCFE) scheme, n clients each obtain a
secret encryption key from a trusted authority. During each time step t, each client i can …

A survey on anonymous communication systems with a focus on dining cryptographers networks

M Shirali, T Tefke, RC Staudemeyer, HC Pöhls - IEEE Access, 2023 - ieeexplore.ieee.org
Traffic analysis attacks can counteract end-to-end encryption and use leaked
communication metadata to reveal information about communicating parties. With an ever …

Conan: Distributed Proofs of Compliance for Anonymous Data Collection

M Zhou, G Fanti, E Shi - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
We consider how to design an anonymous data collection protocol that enforces compliance
rules. Imagine that each client contributes multiple data items (eg, votes, location crumbs, or …

Non-interactive differentially anonymous router

B Bünz, Y Hu, S Matsuo, E Shi - Cryptology ePrint Archive, 2021 - eprint.iacr.org
A recent work by Shi and Wu (Eurocrypt'21) sugested a new, non-interactive abstraction for
anonymous routing, coined Non-Interactive Anonymous Router (\NIAR). They show how to …

Non-interactive anonymous router with quasi-linear router computation

R Fernando, E Shi, P Soni, N Vanjani… - Theory of Cryptography …, 2023 - Springer
Anonymous routing is an important cryptographic primitive that allows users to communicate
privately on the Internet, without revealing their message contents or their contacts. Until the …

Efficient Zero-Knowledge Arguments for Paillier Cryptosystem

G Borui, WF Lau, MH Au, R Yang, H Xue… - Cryptology ePrint …, 2024 - eprint.iacr.org
We present an efficient zero-knowledge argument of knowledge system customized for the
Paillier cryptosystem. Our system enjoys sublinear proof size, low verification cost, and …

Anonymous permutation routing

P Bunn, E Kushilevitz, R Ostrovsky - Theory of Cryptography Conference, 2023 - Springer
Abstract The Non-Interactive Anonymous Router (NIAR) model was introduced by Shi and
Wu as an alternative to conventional solutions to the anonymous routing problem, in which a …

Dynamic Decentralized Functional Encryption with Strong Security

K Nguyen, D Pointcheval, R Schädlich - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Abstract Decentralized Multi-Client Functional Encryption (DMCFE) extends the basic
functional encryption to multiple clients that do not trust each other. They can independently …