Abstract. Membership encryption is a newly developed cryptographic primitive that combines membership proof and encryption into an unified setting. This paper presents a new flexible mem-bership encryption scheme which is provably secure and significantly more efficient than the previous scheme. Further we apply our proposed membership encryption to construct a round optimal 1-out-of-n priced oblivious transfer (POT) protocol which, unlike the existing 1-out-of-n POT schemes, is proven secure under the universally composable (UC) security model and thus preserves secu-rity when it is executed with multiple protocol instances that run concurrently in an adversarily controlled way. Moreover, using our membership encryption, the POT protocol e...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper ...
Abstract. An adaptive k-out-of-N Priced Oblivious Transfer (POT) scheme is a two-party protocol betw...
We propose a new encryption primitive called Membership Encryption. Let P(G) be a privacy-preserving...
A procurement protocol is a protocol for a buyer to purchase digital goods at their prices from a ve...
Priced oblivious transfer (POT) is a two-party protocol between a vendor and a buyer in which the bu...
We present a general framework for efficient, universally composable oblivious transfer (OT) protoco...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communic...
Authentication is the first defence line to prevent malicious entities to access smart mobile device...
Abstract—Deniable encryption is an important cryptographic primitive, essential in all cryptographic...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper ...
Abstract. An adaptive k-out-of-N Priced Oblivious Transfer (POT) scheme is a two-party protocol betw...
We propose a new encryption primitive called Membership Encryption. Let P(G) be a privacy-preserving...
A procurement protocol is a protocol for a buyer to purchase digital goods at their prices from a ve...
Priced oblivious transfer (POT) is a two-party protocol between a vendor and a buyer in which the bu...
We present a general framework for efficient, universally composable oblivious transfer (OT) protoco...
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for u...
In this paper, we propose a two-round k-out-of-n oblivious transfer scheme with the minimum communic...
Authentication is the first defence line to prevent malicious entities to access smart mobile device...
Abstract—Deniable encryption is an important cryptographic primitive, essential in all cryptographic...
International audienceAn important problem in secure multi-party computation is the design of protoc...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
Abstract. We present a universally composable multiparty computation protocol that is adap-tively se...
Abstract. We propose the first distributed discrete-log key generation (DLKG) protocol from scratch ...
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper ...