Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Aarushi Goel"'
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2022:304-324
Set membership proofs are an invaluable part of privacy preserving systems. These proofs allow a prover to demonstrate knowledge of a witness w corresponding to a secret element x of a public set, such that they jointly satisfy a given NP relation, i
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031306167
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::41eb7f6b6c14043a01c63a121be42efc
https://doi.org/10.1007/978-3-031-30617-4_12
https://doi.org/10.1007/978-3-031-30617-4_12
Publikováno v:
Theory of Cryptography ISBN: 9783031223679
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ffb7fc92b4c699b40415df53a97a3c46
https://doi.org/10.1007/978-3-031-22368-6_5
https://doi.org/10.1007/978-3-031-22368-6_5
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031070846
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e6a4bfecae8de69262cee69808c0baa0
https://doi.org/10.1007/978-3-031-07085-3_16
https://doi.org/10.1007/978-3-031-07085-3_16
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031069437
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8bc46d8550638637df177a64c2dded83
https://doi.org/10.1007/978-3-031-06944-4_14
https://doi.org/10.1007/978-3-031-06944-4_14
Publikováno v:
PODC
Byzantine agreement (BA), the task of n parties to agree on one of their input bits in the face of malicious agents, is a powerful primitive that lies at the core of a vast range of distributed protocols. Interestingly, in BA protocols with the best
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 16:757-769
Breach in password databases has been a frequent phenomena in the software industry. Often these breaches go undetected for years. Sometimes, even the companies involved are not aware of the breach. Even after they are detected, publicizing such atta
Autor:
Benny Applebaum, Aarushi Goel
Publikováno v:
Theory of Cryptography ISBN: 9783030904586
TCC (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Theory of Cryptography
TCC (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Theory of Cryptography
We introduce the notion of elementary MPC reductions that allow us to securely compute a functionality f by making a single call to a constant-degree “non-cryptographic” functionality g without requiring any additional interaction. Roughly speaki
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::03df0f48cdcc3947dc06af38ee8d2158
Publikováno v:
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
CRYPTO (2)
CRYPTO (2)
Existing approaches to secure multiparty computation (MPC) require all participants to commit to the entire duration of the protocol. As interest in MPC continues to grow, it is inevitable that there will be a desire to use it to evaluate increasingl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::64cf75b5cdacc1f4fc04dbe741e4c3a1
https://doi.org/10.1007/978-3-030-84245-1_4
https://doi.org/10.1007/978-3-030-84245-1_4
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030778859
EUROCRYPT (2)
EUROCRYPT (2)
Running secure multiparty computation (MPC) protocols with hundreds or thousands of players would allow leveraging large volunteer networks (such as blockchains and Tor) and help justify honest majority assumptions. However, most existing protocols h
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bcb78b4ef27060979b6a858e7c189612
https://doi.org/10.1007/978-3-030-77886-6_23
https://doi.org/10.1007/978-3-030-77886-6_23