Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Frederiksen, Tore Kasper"'
Autor:
Frederiksen, Tore Kasper
As governments around the world decide to deploy digital health passports as a tool to curb the spread of Covid-19, it becomes increasingly important to consider how these can be constructed with privacy-by-design. In this paper we discuss the privac
Externí odkaz:
http://arxiv.org/abs/2105.13910
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Frederiksen, T K, Pinkas, B & Yanai, A 2018, Committed MPC : Maliciously Secure Multiparty Computation from Homomorphic Commitments . in M Abdalla & R Dahab (eds), Public-Key Cryptography – PKC 2018 : 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I . Springer, Lecture Notes in Computer Science, vol. 10769, pp. 587-619, 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2018, Rio de Janeiro, Brazil, 25/03/2018 . https://doi.org/10.1007/978-3-319-76578-5_20
We present a new multiparty computation protocol secure against a static and malicious dishonest majority. Unlike most previous protocols that were based on working on MAC-ed secret shares, our approach is based on computations on homomorphic commitm
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::1fdd07464df8e6098e640548c967aa80
https://pure.au.dk/portal/da/publications/committed-mpc(f1cae4d9-ed8c-4544-ac00-5335f43bc2b1).html
https://pure.au.dk/portal/da/publications/committed-mpc(f1cae4d9-ed8c-4544-ac00-5335f43bc2b1).html
Publikováno v:
Frederiksen, T K, Lindell, Y, Osheter, V & Pinkas, B 2018, Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries . in Advances in Cryptology – CRYPTO 2018 : 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II . Springer, Lecture Notes in Computer Science, vol. 10992, pp. 331-361, Santa Barbara, United States, 19/08/2018 . https://doi.org/10.1007/978-3-319-96881-0_12
We present two new, highly efficient, protocols for securely generating a distributed RSA key pair in the two-party setting. One protocol is semi-honestly secure and the other maliciously secure. Both are constant round and do not rely on any specifi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::ae8cf7b93a849e96172b420cd2755077
https://pure.au.dk/portal/da/publications/fast-distributed-rsa-key-generation-for-semihonest-and-malicious-adversaries(e2cd3855-e94a-495a-8451-48ad12f8b966).html
https://pure.au.dk/portal/da/publications/fast-distributed-rsa-key-generation-for-semihonest-and-malicious-adversaries(e2cd3855-e94a-495a-8451-48ad12f8b966).html
Publikováno v:
Trifiletti, R, Nielsen, J B, Frederiksen, T K & Jakobsen, T P 2016, On the Complexity of Additively Homomorphic UC Commitments . in E Kushilevitz & T Malkin (eds), Theory of Cryptography-13th International Conference, TCC 2016-A . vol. 9562, Springer VS, Springer Berlin Heidelberg, Lecture Notes in Computer Science, vol. 9562, pp. 542-565, Theory of Cryptography Conference, Tel Aviv, Israel, 10/01/2016 . https://doi.org/10.1007/978-3-662-49096-9
We present a new constant round additively homomorphic commitment scheme with (amortized) computational and communication complexity linear in the size of the string committed to. Our scheme is based on the non-homomorphic commitment scheme of Cascud
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::026c4e775673ed282fd0d8436c274416
https://pure.au.dk/portal/da/publications/on-the-complexity-of-additively-homomorphic-uc-commitments(98bd26e6-af3c-484b-a3f1-e1dc154c7aba).html
https://pure.au.dk/portal/da/publications/on-the-complexity-of-additively-homomorphic-uc-commitments(98bd26e6-af3c-484b-a3f1-e1dc154c7aba).html
Publikováno v:
Frederiksen, T K, Nielsen, J B & Orlandi, C 2015, Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge . in E Oswald & M Fischlin (eds), Advances in Cryptology-EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II . Springer VS, Lecture Notes in Computer Science, vol. 9057, pp. 191-219, Sofia, Bulgaria, 26/04/2015 . https://doi.org/10.1007/978-3-662-46803-6_7
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::74547fa4d12be99c0c4c6a0f7de630ce
https://pure.au.dk/portal/da/publications/privacyfree-garbled-circuits-with-applications-to-efficient-zeroknowledge(ed7255e5-8cc5-460d-bcb3-2b6aa35c18a9).html
https://pure.au.dk/portal/da/publications/privacyfree-garbled-circuits-with-applications-to-efficient-zeroknowledge(ed7255e5-8cc5-460d-bcb3-2b6aa35c18a9).html
Autor:
Frederiksen, Tore Kasper
Publikováno v:
Frederiksen, T K 2015, The Hitchhiker’s Guide to Garbled Circuits : Garbled Circuits and their Applications to Maliciously Secure Two-Party Protocols . Department of Computer Science, Aarhus University .
I de seneste par år er forkludrede kredsløb blevet hævet fra bare at være en komponent i Yao’s protokol til sikre to-parts beregninger, til at være et kryptografisk primitiv i sig selv. I denne afhandling videreudvikler vi området af forkludr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::e887d3e17fe21835be0f28045f86a34e
https://pure.au.dk/portal/da/publications/the-hitchhikers-guide-to-garbled-circuits(b7809e91-947e-4dd9-94e6-6eac17068bc6).html
https://pure.au.dk/portal/da/publications/the-hitchhikers-guide-to-garbled-circuits(b7809e91-947e-4dd9-94e6-6eac17068bc6).html
Publikováno v:
Frederiksen, T K, Nielsen, J B & Orlandi, C 2014 ' Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge ' Cryptology ePrint Archive, pp. 30 .
In the last few years garbled circuits (GC) have been elevated from being merely a component in Yao’s protocol for secure two-party computation, to a cryptographic primitive in its own right, following the growing number applications that use GCs.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::f797a248e437811fd7b08ef20d7bc8c0
https://pure.au.dk/portal/da/publications/privacyfree-garbled-circuits-with-applications-to-efficient-zeroknowledge(c17d4c16-a750-447b-8c3d-5ee7cf8fd01e).html
https://pure.au.dk/portal/da/publications/privacyfree-garbled-circuits-with-applications-to-efficient-zeroknowledge(c17d4c16-a750-447b-8c3d-5ee7cf8fd01e).html
Publikováno v:
Frederiksen, T K, Jakobsen, T P & Nielsen, J B 2014, Faster Maliciously Secure Two-Party Computation Using the GPU . in M Abdalla & R D Prisco (eds), Security and Cryptography for Networks : 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings . Springer, Lecture Notes in Computer Science, vol. 8642, pp. 358-379, Amalfi, Italy, 03/09/2014 . https://doi.org/10.1007/978-3-319-10879-7_21
To avoid data races, concurrent operations should either be at distinct times or on distinct data. Atomicity is the abstraction that an operation takes effect at a single, discrete instant in time, with linearisability being a well-known correctness
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::f1935dd307093f051780c7f1d2d19262
https://pure.au.dk/portal/da/publications/faster-maliciously-secure-twoparty-computation-using-the-gpu(d7444e81-c0cd-4535-9f76-1cb11c53a54d).html
https://pure.au.dk/portal/da/publications/faster-maliciously-secure-twoparty-computation-using-the-gpu(d7444e81-c0cd-4535-9f76-1cb11c53a54d).html
Publikováno v:
Frederiksen, T K & Nielsen, J B 2013, Fast and maliciously secure two-party computation using the GPU . in Applied Cryptography and Network Security : 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceeding . Springer VS, Lecture Notes in Computer Science, vol. 7954, pp. 339-356, Banff, Canada, 25/06/2013 . https://doi.org/10.1007/978-3-642-38980-1_21
We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::2bddf01b4493bfd502bd49f6cf5fe3f8
https://pure.au.dk/portal/da/publications/fast-and-maliciously-secure-twoparty-computation-using-the-gpu(fa3004a5-35e5-47ca-b5bf-70890be91fb3).html
https://pure.au.dk/portal/da/publications/fast-and-maliciously-secure-twoparty-computation-using-the-gpu(fa3004a5-35e5-47ca-b5bf-70890be91fb3).html