Skip to main content

Implementing Multi-Party Computation Technology

Searching for OpenAIRE data...

Publications

Faster Homomorphic Evaluation of Discrete Fourier Transforms

Author(s): Anamaria Costache, Nigel P. Smart, Srinivas Vivek
Published in: FCDC 2017, 2017, Page(s) 517-529
DOI: 10.1007/978-3-319-70972-7_29

When It's All Just Too Much: Outsourcing MPC-Preprocessing

Author(s): Peter Scholl, Nigel P. Smart, Tim Wood
Published in: IMACC 2017, 2017, Page(s) 77-99
DOI: 10.1007/978-3-319-71045-7_4

Multi-rate Threshold FlipThem

Author(s): David Leslie, Chris Sherfield, Nigel P. Smart
Published in: ESORICS 2017, 2017, Page(s) 174-190
DOI: 10.1007/978-3-319-66399-9_10

Generic Forward-Secure Key Agreement Without Signatures

Author(s): Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi
Published in: ISC 2017, 2017, Page(s) 114-133
DOI: 10.1007/978-3-319-69659-1_7

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

Author(s): Martin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart
Published in: ESORICS 2017, 2017, Page(s) 29-46
DOI: 10.1007/978-3-319-66402-6_4

MPC Joins The Dark Side

Author(s): John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
Published in: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security - Asia CCS '19, 2019, Page(s) 148-159
DOI: 10.1145/3321705.3329809

Modes of Operation Suitable for Computing on Encrypted Data

Author(s): Dragos Rotaru and Nigel P. Smart and Martijn Stam
Published in: Transactions on Symmetric Cryptology, 2017, ISSN 2519-173X
DOI: 10.13154/tosc.v2017.i3.294-324

From Keys to Databases—Real-World Applications of Secure Multi-Party Computation

Author(s): David W Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P Smart, Rebecca N Wright
Published in: The Computer Journal, 2018, ISSN 0010-4620
DOI: 10.1093/comjnl/bxy090

Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ

Author(s): Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai
Published in: Journal of Cryptology, Issue 32/3, 2019, Page(s) 1026-1069, ISSN 0933-2790
DOI: 10.1007/s00145-019-09322-2

Reducing Communication Channels in MPC

Author(s): Marcel Keller, Dragos Rotaru, Nigel P. Smart, Tim Wood
Published in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5–7, 2018, Proceedings, Issue 11035, 2018, Page(s) 181-199
DOI: 10.1007/978-3-319-98113-0_10

Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation

Author(s): Nigel P. Smart, Tim Wood
Published in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 210-229
DOI: 10.1007/978-3-030-12612-4_11

CAPA: The Spirit of Beaver Against Physical Attacks

Author(s): Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel Smart
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 121-151
DOI: 10.1007/978-3-319-96884-1_5

EPIC: Efficient Private Image Classification (or: Learning from the Masters)

Author(s): Eleftheria Makri, Dragos Rotaru, Nigel P. Smart, Frederik Vercauteren
Published in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 473-492
DOI: 10.1007/978-3-030-12612-4_24

TinyKeys: A New Approach to Efficient Multi-Party Computation

Author(s): Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 3-33
DOI: 10.1007/978-3-319-96878-0_1

Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)

Author(s): Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 86-117
DOI: 10.1007/978-3-030-03332-3_4

Benchmarking Privacy Preserving Scientific Operations

Author(s): Abdelrahaman Aly, Nigel P. Smart
Published in: Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedings, Issue 11464, 2019, Page(s) 509-529
DOI: 10.1007/978-3-030-21568-2_25

Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme

Author(s): Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui
Published in: Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings, Issue 11547, 2019, Page(s) 192-210
DOI: 10.1007/978-3-030-21548-4_11