Towards practical secure neural network inference: the journey so far and the road ahead

ZÁ Mann, C Weinert, D Chabal, JW Bos - ACM Computing Surveys, 2023 - dl.acm.org
Neural networks (NNs) have become one of the most important tools for artificial
intelligence. Well-designed and trained NNs can perform inference (eg, make decisions or …

Publicly verifiable zero-knowledge and post-quantum signatures from vole-in-the-head

C Baum, L Braun, CD de Saint Guilhem… - Annual International …, 2023 - Springer
We present a new method for transforming zero-knowledge protocols in the designated
verifier setting into public-coin protocols, which can be made non-interactive and publicly …

One tree to rule them all: Optimizing ggm trees and owfs for post-quantum signatures

C Baum, W Beullens, S Mukherjee, E Orsini… - … Conference on the …, 2025 - Springer
The use of MPC-in-the-Head (MPCitH) based zero knowledge proofs of knowledge (ZKPoK)
to prove knowledge of a preimage of a one-way function (OWF) is a popular approach …

Secure two-party threshold ECDSA from ECDSA assumptions

J Doerner, Y Kondi, E Lee… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used
schemes in deployed cryptography. Through its applications in code and binary …

Actively secure OT extension with optimal overhead

M Keller, E Orsini, P Scholl - Annual Cryptology Conference, 2015 - Springer
We describe an actively secure OT extension protocol in the random oracle model with
efficiency very close to the passively secure IKNP protocol of Ishai et al.(Crypto 2003). For …

Threshold ECDSA in three rounds

J Doerner, Y Kondi, E Lee… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We present a three-round protocol for threshold ECDSA signing with malicious security
against a dishonest majority, which information-theoretically UC-realizes a standard …

[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications

K Sedghighadikolaei, AA Yavuz - arXiv preprint arXiv:2311.05514, 2023 - researchgate.net
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …

Threshold bbs+ signatures for distributed anonymous credential issuance

J Doerner, Y Kondi, E Lee, A Shelat… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
We propose a secure multiparty signing protocol for the BBS+ signature scheme; in other
words, an anonymous credential scheme with threshold issuance. We prove that due to the …

FOLEAGE: OLE-Based Multi-party Computation for Boolean Circuits

M Bombar, D Bui, G Couteau, A Couvreur… - … Conference on the …, 2025 - Springer
Abstract Secure Multi-party Computation (MPC) allows two or more parties to compute any
public function over their privately-held inputs, without revealing any information beyond the …

Quietot: Lightweight oblivious transfer with a public-key setup

G Couteau, L Devadas, S Devadas, A Koch… - … Conference on the …, 2025 - Springer
Oblivious Transfer (OT) is at the heart of secure computation and is a foundation for many
applications in cryptography. Over two decades of work have led to extremely efficient …