Zobrazeno 1 - 10
of 130
pro vyhledávání: '"S. Dov Gordon"'
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2022:229-249
We present gOTzilla, a protocol for interactive zero-knowledge proofs for very large disjunctive statements of the following format: given publicly known circuit C, and set of values Y = {y1 , . . . , yn }, prove knowledge of a witness x such that C(
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2022:291-313
We design several new protocols for private set intersection (PSI) with active security: one for the two party setting, and two protocols for the multi-party setting. In recent years, the state-of-the-art protocols for two party PSI have all been bui
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2022, Iss 1, Pp 49-74 (2022)
We propose a new theoretical approach for building anonymous mixing mechanisms for cryptocurrencies. Rather than requiring a fully uniform permutation during mixing, we relax the requirement, insisting only that neighboring permutations are similarly
Publikováno v:
Theory of Cryptography ISBN: 9783031223648
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3a7550c16ba37994934258a5bd3bd123
https://doi.org/10.1007/978-3-031-22365-5_13
https://doi.org/10.1007/978-3-031-22365-5_13
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030778859
EUROCRYPT (2)
EUROCRYPT (2)
Secure multi-party computation (MPC) allows multiple parties to perform secure joint computations on their private inputs. Today, applications for MPC are growing with thousands of parties wishing to build federated machine learning models or trusted
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1ded0d944f0608bd2e313f76ce71883e
https://doi.org/10.1007/978-3-030-77886-6_24
https://doi.org/10.1007/978-3-030-77886-6_24
Publikováno v:
CCS
We construct new protocols for two parties to securely compute on the items in their intersection. Our protocols make use of an untrusted third party that has no input. The use of this party allows us to construct highly efficient protocols that are
Publikováno v:
CCS
Tor is a tool for Internet privacy with millions of daily users. The Tor system benefits in many ways from information gathered about the operation of its network. Measurements guide operators in diagnosing problems, direct the efforts of developers,
Publikováno v:
Journal of Cryptology. 32:742-824
The literature on leakage-resilient cryptography contains various leakage models that provide different levels of security. In the bounded leakage model (Akavia et al.—TCC 2009), it is assumed that there is a fixed upper bound L on the number of bi
Autor:
S. Dov Gordon, Sahar Mazloom
Publikováno v:
CCS
We explore a new security model for secure computation on large datasets. We assume that two servers have been employed to compute on private data that was collected from many users, and, in order to improve the efficiency of their computation, we es
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030033316
ASIACRYPT (3)
ASIACRYPT (3)
We construct new four-party protocols for secure computation that are secure against a single malicious corruption. Our protocols can perform computations over a binary ring, and require sending just 1.5 ring elements per party, per gate. In the spec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cf7a9d10c1c14fcbe92021b10b3c63e6
https://doi.org/10.1007/978-3-030-03332-3_3
https://doi.org/10.1007/978-3-030-03332-3_3