Skip to main content

Secure Computation on Encrypted Data

Searching for OpenAIRE data...

Publications

Conditional Disclosure of Secrets via Non-linear Reconstruction

Author(s): Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
Published in: Advances in Cryptology - CRYPTO 2017, 2017, Page(s) 758-790
DOI: 10.1007/978-3-319-63688-7_25

Access Control Encryption for Equality, Comparison, and More

Author(s): Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi
Published in: PKC 2017, 2017, Page(s) 88-118
DOI: 10.1007/978-3-662-54388-7_4

Multi-input Inner-Product Functional Encryption from Pairings

Author(s): Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee
Published in: Advances in Cryptology - EUROCRYPT 2017, 2017, Page(s) 601-626
DOI: 10.1007/978-3-319-56620-7_21

Déjà Q: Encore! Un Petit IBE

Author(s): Hoeteck Wee
Published in: TCC 2016-A, 2016, Page(s) 237-258
DOI: 10.1007/978-3-662-49099-0_9

Targeted Homomorphic Attribute-Based Encryption

Author(s): Brakerski, Zvika; Cash, David; Tsabary , Rotem; Wee, Hoeteck
Published in: TCC 2016-B, 2016
DOI: 10.1007/978-3-662-53644-5_13

Private Constrained PRFs (and More) from LWE

Author(s): Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee
Published in: TCC 2017, 2017, Page(s) 264-302
DOI: 10.1007/978-3-319-70500-2_10

Homomorphic Secret Sharing - Optimizations and Applications

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù
Published in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 2105-2122
DOI: 10.1145/3133956.3134107

Attribute-Based Encryption in the Generic Group Model - Automated Proofs and New Constructions

Author(s): Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee
Published in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17, 2017, Page(s) 647-664
DOI: 10.1145/3133956.3134088

Lattice-Based zk-SNARKs from Square Span Programs

Author(s): Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 556-573
DOI: 10.1145/3243734.3243845

Non-interactive Zaps of Knowledge

Author(s): Georg Fuchsbauer, Michele Orrù
Published in: ACNS, 2018, Page(s) 44-62
DOI: 10.1007/978-3-319-93387-0_3

GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates

Author(s): Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee
Published in: CRYPTO, 2018, Page(s) 577-607
DOI: 10.1007/978-3-319-96881-0_20

Unbounded ABE via Bilinear Entropy Expansion, Revisited

Author(s): Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee
Published in: EUROCRYPT, 2018, Page(s) 503-534
DOI: 10.1007/978-3-319-78381-9_19

Towards Breaking the Exponential Barrier for General Secret Sharing

Author(s): Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee
Published in: EUROCRYPT, 2018, Page(s) 567-596
DOI: 10.1007/978-3-319-78381-9_21

Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys

Author(s): Romain Gay, Lucas Kowalczyk, Hoeteck Wee
Published in: SCN, 2018, Page(s) 123-139
DOI: 10.1007/978-3-319-98113-0_7

Laconic Function Evaluation and Applications

Author(s): Willy Quach, Hoeteck Wee, Daniel Wichs
Published in: 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS), 2018, Page(s) 859-870
DOI: 10.1109/focs.2018.00086

Tightly CCA-Secure Encryption Without Pairings

Author(s): Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee
Published in: Advances in Cryptology – EUROCRYPT 2016, 2016, Page(s) 1-27
DOI: 10.1007/978-3-662-49890-3_1

Predicate Encryption for Circuits from LWE

Author(s): Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
Published in: Advances in Cryptology -- CRYPTO 2015, 2015, Page(s) 503-523
DOI: 10.1007/978-3-662-48000-7_25

FHE Circuit Privacy Almost for Free

Author(s): Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee
Published in: Advances in Cryptology – CRYPTO 2016, 2016, Page(s) 62-89
DOI: 10.1007/978-3-662-53008-5_3

Structure-Preserving Signatures from Standard Assumptions, Revisited

Author(s): Eike Kiltz, Jiaxin Pan, Hoeteck Wee
Published in: Advances in Cryptology -- CRYPTO 2015, 2015, Page(s) 275-295
DOI: 10.1007/978-3-662-48000-7_14

Compact Adaptively Secure ABE for $$\mathsf {NC^1}$$ from k-Lin

Author(s): Lucas Kowalczyk, Hoeteck Wee
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I, Issue 11476, 2019, Page(s) 3-33
DOI: 10.1007/978-3-030-17653-2_1

Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble

Author(s): Georg Fuchsbauer, Michele Orrù, Yannick Seurin
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I, Issue 11476, 2019, Page(s) 657-689
DOI: 10.1007/978-3-030-17653-2_22

Obfuscating Simple Functionalities from Knowledge Assumptions

Author(s): Ward Beullens, Hoeteck Wee
Published in: Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, Issue 11443, 2019, Page(s) 254-283
DOI: 10.1007/978-3-030-17259-6_9

From Single-Input to Multi-client Inner-Product Functional Encryption

Author(s): Michel Abdalla, Fabrice Benhamouda, Romain Gay
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III, Issue 11923, 2019, Page(s) 552-582
DOI: 10.1007/978-3-030-34618-8_19