Skip to main content

Implementing Multi-Party Computation Technology

Searching for OpenAIRE data...

Publications

Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZ

Author(s): Carsten Baum, Daniele Cozzo, Nigel P. Smart
Published in: Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers, Issue 11959, 2020, Page(s) 274-302
DOI: 10.1007/978-3-030-38471-5_12

Multi-Key Homomorphic Encryption from TFHE

Author(s): Hao Chen, Ilaria Chillotti, Yongsoo Song
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II, Issue 11922, 2019, Page(s) 446-472
DOI: 10.1007/978-3-030-34621-8_16

BBQ: Using AES in Picnic Signatures

Author(s): Cyprien Delpech de Saint Guilhem, Lauren De Meyer, Emmanuela Orsini, Nigel P. Smart
Published in: Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers, Issue 11959, 2020, Page(s) 669-692
DOI: 10.1007/978-3-030-38471-5_27

Distributing Any Elliptic Curve Based Protocol

Author(s): Nigel P. Smart, Younes Talibi Alaoui
Published in: Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings, Issue 11929, 2019, Page(s) 342-366
DOI: 10.1007/978-3-030-35199-1_17

Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability

Author(s): Carsten Baum, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part II, Issue 12171, 2020, Page(s) 562-592
DOI: 10.1007/978-3-030-56880-1_20

Overdrive2k: Efficient Secure MPC over $$\mathbb {Z}_{2^k}$$ from Somewhat Homomorphic Encryption

Author(s): Emmanuela Orsini, Nigel P. Smart, Frederik Vercauteren
Published in: Topics in Cryptology – CT-RSA 2020 - The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings, Issue 12006, 2020, Page(s) 254-283
DOI: 10.1007/978-3-030-40186-3_12

LegRoast: Efficient Post-quantum Signatures from the Legendre PRF

Author(s): Ward Beullens, Cyprien Delpech de Saint Guilhem
Published in: Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings, Issue 12100, 2020, Page(s) 130-150
DOI: 10.1007/978-3-030-44223-1_8

Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT

Author(s): Cyprien Delpech de Saint Guilhem, Emmanuela Orsini, Christophe Petit, Nigel P. Smart
Published in: Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings, Issue 12579, 2020, Page(s) 235-258
DOI: 10.1007/978-3-030-65411-5_12

Reducing Communication Channels in MPC

Author(s): Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood
Published in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings, Issue 11035, 2018, Page(s) 181-199
DOI: 10.1007/978-3-319-98113-0_10

Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation

Author(s): Nigel P. Smart, Tim Wood
Published in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 210-229
DOI: 10.1007/978-3-030-12612-4_11

CAPA: The Spirit of Beaver Against Physical Attacks

Author(s): Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel Smart
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 121-151
DOI: 10.1007/978-3-319-96884-1_5

EPIC: Efficient Private Image Classification (or: Learning from the Masters)

Author(s): Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren
Published in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 473-492
DOI: 10.1007/978-3-030-12612-4_24

TinyKeys: A New Approach to Efficient Multi-Party Computation

Author(s): Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 3-33
DOI: 10.1007/978-3-319-96878-0_1

Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)

Author(s): Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 86-117
DOI: 10.1007/978-3-030-03332-3_4

Benchmarking Privacy Preserving Scientific Operations

Author(s): Abdelrahaman Aly, Nigel P. Smart
Published in: Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, Issue 11464, 2019, Page(s) 509-529
DOI: 10.1007/978-3-030-21568-2_25

Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme

Author(s): Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui
Published in: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings, Issue 11547, 2019, Page(s) 192-210
DOI: 10.1007/978-3-030-21548-4_11

Sharing the LUOV: Threshold Post-quantum Signatures

Author(s): Daniele Cozzo, Nigel P. Smart
Published in: Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings, Issue 11929, 2019, Page(s) 128-153
DOI: 10.1007/978-3-030-35199-1_7

Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol

Author(s): Daniele Cozzo, Nigel P. Smart
Published in: Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings, Issue 12100, 2020, Page(s) 169-186
DOI: 10.1007/978-3-030-44223-1_10

Zaphod - Efficiently Combining LSSS and Garbled Circuits in SCALE

Author(s): Abdelrahaman Aly, Emmanuela Orsini, Dragos Rotaru, Nigel P. Smart, Tim Wood
Published in: Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography - WAHC'19, 2019, Page(s) 33-44
DOI: 10.1145/3338469.3358943

TaaS - Commodity MPC via Triples-as-a-Service

Author(s): Nigel P. Smart, Titouan Tanguy
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop - CCSW'19, 2019, Page(s) 105-116
DOI: 10.1145/3338466.3358918

Onion Ring ORAM - Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE

Author(s): Hao Chen, Ilaria Chillotti, Ling Ren
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 345-360
DOI: 10.1145/3319535.3354226

Authentication in Key-Exchange: Definitions, Relations and Composition

Author(s): Cyprien Delpech de Saint Guilhem, Marc Fischlin, Bogdan Warinschi
Published in: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 2020, Page(s) 288-303
DOI: 10.1109/csf49147.2020.00028

Faster Homomorphic Evaluation of Discrete Fourier Transforms

Author(s): Anamaria Costache, Nigel P. Smart, Srinivas Vivek
Published in: FCDC 2017, 2017, Page(s) 517-529
DOI: 10.1007/978-3-319-70972-7_29

When It's All Just Too Much: Outsourcing MPC-Preprocessing

Author(s): Peter Scholl, Nigel P. Smart, Tim Wood
Published in: IMACC 2017, 2017, Page(s) 77-99
DOI: 10.1007/978-3-319-71045-7_4

Multi-rate Threshold FlipThem

Author(s): David Leslie, Chris Sherfield, Nigel P. Smart
Published in: ESORICS 2017, 2017, Page(s) 174-190
DOI: 10.1007/978-3-319-66399-9_10

Generic Forward-Secure Key Agreement Without Signatures

Author(s): Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
Published in: ISC 2017, 2017, Page(s) 114-133
DOI: 10.1007/978-3-319-69659-1_7

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

Author(s): Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart
Published in: ESORICS 2017, 2017, Page(s) 29-46
DOI: 10.1007/978-3-319-66402-6_4

MPC Joins The Dark Side

Author(s): John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
Published in: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security - Asia CCS '19, 2019, Page(s) 148-159
DOI: 10.1145/3321705.3329809

Modes of Operation Suitable for Computing on Encrypted Data

Author(s): Dragos Rotaru and Nigel P. Smart and Martijn Stam
Published in: Transactions on Symmetric Cryptology, 2017, ISSN 2519-173X
DOI: 10.13154/tosc.v2017.i3.294-324

From Keys to Databases—Real-World Applications of Secure Multi-Party Computation

Author(s): David W Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P Smart, Rebecca N Wright
Published in: The Computer Journal, 2018, ISSN 0010-4620
DOI: 10.1093/comjnl/bxy090

Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ

Author(s): Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai
Published in: Journal of Cryptology, Issue 32/3, 2019, Page(s) 1026-1069, ISSN 0933-2790
DOI: 10.1007/s00145-019-09322-2