Zobrazeno 1 - 10
of 47
pro vyhledávání: '"Jacob C. N. Schuldt"'
Publikováno v:
Designs, Codes and Cryptography. 91:1645-1684
In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our schemes are based on learning with errors (LWE) besides appropriate circular security assumptions. I
Publikováno v:
IEICE Transactions on Information and Systems. (3):212-227
Publikováno v:
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security.
In this paper, we propose memory- and round-efficient protocols for securely evaluating arithmetic primitives. We focus on secure two-party computation over the ring ℤ2k that achieves security against semi-honest adversaries and works in the pre-pr
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1668-1675
Autor:
Hiraku Morita, Goichiro Hanaoaka, Nuttapong Attrapadung, Kazunari Tozawa, Takahiro Matsuda, Tadanori Teruya, Kazuma Ohara, Jacob C. N. Schuldt
Publikováno v:
CCS
In this paper we propose efficient two-party protocols for obliviously applying a (possibly random) linear group action to a data set. Our protocols capture various applications such as oblivious shuffles, circular shifts, matrix multiplications, to
Autor:
Jacob C. N. Schuldt, Goichiro Hanaoka, Shinsaku Kiyomoto, Nuttapong Attrapadung, Tomoaki Mimoto
Publikováno v:
PST
Secure two-party comparison plays a crucial role in many privacy-preserving applications, such as privacy-preserving data mining and machine learning. In particular, the available comparison protocols with the appropriate input/output configuration h
Autor:
Yutaka Kawai, Jacob C. N. Schuldt, Goichiro Hanaoka, Nuttapong Attrapadung, Takato Hirano, Koseki Yoshihiro
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030925178
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f68f5ded98d45c3d24ebf14079321d3f
https://doi.org/10.1007/978-3-030-92518-5_20
https://doi.org/10.1007/978-3-030-92518-5_20
Publikováno v:
Computer Security – ESORICS 2020 ISBN: 9783030590123
ESORICS (2)
ESORICS (2)
Private information retrieval (PIR) allows a client to retrieve data from a database without the database server learning what data is being retrieved. Although many PIR schemes have been proposed in the literature, almost all of these focus on retri
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5e88f27c4ccab67eb9a9ecd458cafcaf
https://doi.org/10.1007/978-3-030-59013-0_33
https://doi.org/10.1007/978-3-030-59013-0_33
Publikováno v:
Cryptography and Communications. 10:777-801
Levillain et al. (Asia CCS 2015) proposed two cookie masking methods, TLS Scramble and MCookies, to counter a class of attacks on SSL/TLS in which the attacker is able to exploit its ability to obtain many encryptions of a target HTTP cookie. In part