Secure two-party threshold ECDSA from ECDSA assumptions

J Doerner, Y Kondi, E Lee… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The Elliptic Curve Digital Signature Algorithm (ECDSA) is one of the most widely used
schemes in deployed cryptography. Through its applications in code and binary …

Concretely efficient secure multi-party computation protocols: survey and more

D Feng, K Yang - Security and Safety, 2022 - sands.edpsciences.org
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on
their private inputs, and reveals nothing but the output of the function. In the last decade …

SoftSpokenOT: Quieter OT extension from small-field silent VOLE in the minicrypt model

L Roy - Annual International Cryptology Conference, 2022 - Springer
Given a small number of base oblivious transfers (OTs), how does one generate a large
number of extended OTs as efficiently as possible? The answer has long been the seminal …

SoftSpokenOT: Communication--Computation Tradeoffs in OT Extension

L Roy - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Given a small number of base oblivious transfers (OTs), how does one generate a large
number of extended OTs as efficiently as possible? The answer has long been the seminal …

XSPIR: efficient symmetrically private information retrieval from Ring-LWE

C Lin, Z Liu, T Malkin - European Symposium on Research in Computer …, 2022 - Springer
Abstract Private Information Retrieval (PIR) allows a client to retrieve one entry from a
database held by a server, while hiding from the server which entry has been retrieved …

Efficient Secure Computation from SM Series Cryptography

Y Lu, Z Wu, B Zhang, K Ren - Wireless Communications and …, 2023 - Wiley Online Library
The wireless network suffers from many security problems, and computation in a wireless
network environment may fail to preserve privacy as well as correctness when the …

Block Ciphers in Idealized Models: Automated Proofs and New Security Results

M Ambrona, P Farshim, P Harasser - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
We develop and implement AlgoROM, a tool to systematically analyze the security of a wide
class of symmetric primitives in idealized models of computation. The schemes that we …

A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR

S Dong, H Cui, K Zhang, K Yang, Y Yu - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Oblivious transfer (OT) is a fundamental cryptographic protocol that plays a crucial role in
secure multi-party computation (MPC). Most practical OT protocols by, eg, Naor and Pinkas …

A two-party hierarchical deterministic wallets in practice

CY Chuang, IH Hsu, TF Lee - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract The applications of Hierarchical Deterministic Wallet are rapidly growing in various
areas such as cryptocurrency exchanges and hardware wallets. Improving privacy and …

A PKI-based framework for establishing efficient MPC channels

D Masny, G Watson - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
The Transport Layer Security (TLS) protocol is a fundamental building block for ensuring
security on Internet. It provides an easy to use framework for the purposes of establishing an …