[HTML][HTML] Architecture and design for resilient networked systems

D Hutchison, JPG Sterbenz - Computer Communications, 2018 - Elsevier
There is a need for new architectures and designs of resilient networked systems that are
capable of supporting critical services and infrastructures. The arguments have previously …

Communication-computation efficient secure aggregation for federated learning

B Choi, J Sohn, DJ Han, J Moon - arXiv preprint arXiv:2012.05433, 2020 - arxiv.org
Federated learning has been spotlighted as a way to train neural networks using distributed
data with no need for individual nodes to share data. Unfortunately, it has also been shown …

Scalable multiparty computation with nearly optimal work and resilience

I Damgård, Y Ishai, M Krøigaard, JB Nielsen… - Advances in Cryptology …, 2008 - Springer
We present the first general protocol for secure multiparty computation in which the total
amount of work required by n players to compute a function f grows only polylogarithmically …

How to Recover a Secret with O(n) Additions

B Applebaum, O Nir, B Pinkas - Annual International Cryptology …, 2023 - Springer
Threshold cryptography is typically based on the idea of secret-sharing a private-key s∈ F
“in the exponent” of some cryptographic group G, or more generally, encoding s in some …

: End-to-End Hybrid Authenticated Key Exchanges

S Bruckner, S Ramacher, C Striecks - International Conference on Post …, 2023 - Springer
End-to-end authenticity in public networks plays a significant role. Namely, without
authenticity, the adversary might be able to retrieve even confidential information straight …

Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority

B Applebaum, E Kachlon, A Patra - Annual International Cryptology …, 2022 - Springer
We introduce the problem of Verifiable Relation Sharing (VRS) where a client (prover)
wishes to share a vector of secret data items among k servers (the verifiers) while proving in …

Almost-everywhere secure computation

JA Garay, R Ostrovsky - Advances in Cryptology–EUROCRYPT 2008: 27th …, 2008 - Springer
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it
is well known that MPC is possible if and only if the underlying communication network has …

[图书][B] Cryptography for security and privacy in cloud computing

S Rass, D Slamanig - 2013 - books.google.com
As is common practice in research, many new cryptographic techniques have been
developed to tackle either a theoretical question or foreseeing a soon to become reality …

A model for adversarial wiretap channels

P Wang, R Safavi-Naini - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
In the wiretap model of secure communication, Alice is connected to Bob over a noisy
channel that is eavesdropped by Eve. The goal is to provide (asymptotic) reliability and …

On game-theoretic network security provisioning

S Rass - Journal of network and systems management, 2013 - Springer
Abstract Service level agreements occasionally come as qualitative claims rather than
quantitative statements. Motivated by the well-known fact that different (security) service …