This paper formalises the security of programmable secure computation focusing on simplifying security proofs of new algorithms for existing computation frameworks. Security of the frameworks is usually well established but the security proofs of the algorithms are often more intuitive than rigorous. This work specifies a transformation from the usual hybrid execution model to an abstract model that is closer to the intuition. We establish various preconditions that are satisfied by natural secure computation frameworks and protocols, thus showing that mostly the intuitive proofs suffice. More elaborate protocols might still need additional proof details
In order to obtain implementations of security protocols proved se-cure in the computational model, ...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Abstract. We study the problem of verifiable computation (VC) in which a computationally weak client...
The notion of secure computation is central tocryptography. Introduced in the seminal works of Yao [...
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a func...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
International audienceGiven the central importance of designing secure protocols, providing solid ma...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
Secure computation research has gained traction internationally in the last five years. In the Unite...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
We present a logic for reasoning about properties of secure systems. The logic is built around a con...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the app...
International audienceIn order to obtain implementations of security protocols proved secure in the ...
In order to obtain implementations of security protocols proved se-cure in the computational model, ...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Abstract. We study the problem of verifiable computation (VC) in which a computationally weak client...
The notion of secure computation is central tocryptography. Introduced in the seminal works of Yao [...
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a func...
AbstractKnown secure multi-party computation protocols are quite complex, involving non-trivial math...
International audienceGiven the central importance of designing secure protocols, providing solid ma...
Abstract. This paper presents the first automatic technique for proving not only protocols but also ...
Abstract—We study a problem of secure computation by multiple parties of a given function of their c...
Secure computation research has gained traction internationally in the last five years. In the Unite...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
We present a logic for reasoning about properties of secure systems. The logic is built around a con...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the app...
International audienceIn order to obtain implementations of security protocols proved secure in the ...
In order to obtain implementations of security protocols proved se-cure in the computational model, ...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Abstract. We study the problem of verifiable computation (VC) in which a computationally weak client...