Functional encryption (FE) has incredible applications towards computing on encrypted data. However, constructing the most general form of this primitive has remained elusive. Although some candidate constructions exist, they rely on nonstandard assumptions, and thus, their security has been questioned. An FE combiner attempts to make use of these candidates while minimizing the trust placed on any individual FE candidate. Informally, an FE combiner takes in a set of FE candidates and outputs a secure FE scheme if at least one of the candidates is secure. Another fundamental area in cryptography is secure multi-party computation (MPC), which has been extensively studied for several decades. In this work, we initiate a formal study of the r...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
This work defines a notion of secure multiparty computation: MPC with fall-back security. Fall-back ...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
Secure Multi-Party Computation (MPC) allows a group of parties to compute a join function on their i...
Multi-client functional encryption (MC-FE) is a powerful concept that makes it possible to compute o...
Security amplification is a fundamental problem in cryptography. In this work, we study security amp...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR...
Abstract A (1,2)-robust combiner for a cryptographic primitive P is a construction that takes twocan...
The growing influence of the Internet and other communication networks on our daily lives and on the...
We present a computationally secure MPC protocol for threshold adversaries which is parametrized by ...
The notion of multi-input functional encryption (MI-FE) was recently introduced by Goldwasser et al....
Motivated by what we call honest but lazy‚ parties in the context of secure multi party computatio...
In secure multiparty computation (MPC), the goal is to allow a set of mutually distrustful parties t...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
This work defines a notion of secure multiparty computation: MPC with fall-back security. Fall-back ...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
Secure Multi-Party Computation (MPC) allows a group of parties to compute a join function on their i...
Multi-client functional encryption (MC-FE) is a powerful concept that makes it possible to compute o...
Security amplification is a fundamental problem in cryptography. In this work, we study security amp...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR...
Abstract A (1,2)-robust combiner for a cryptographic primitive P is a construction that takes twocan...
The growing influence of the Internet and other communication networks on our daily lives and on the...
We present a computationally secure MPC protocol for threshold adversaries which is parametrized by ...
The notion of multi-input functional encryption (MI-FE) was recently introduced by Goldwasser et al....
Motivated by what we call honest but lazy‚ parties in the context of secure multi party computatio...
In secure multiparty computation (MPC), the goal is to allow a set of mutually distrustful parties t...
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the c...
This work defines a notion of secure multiparty computation: MPC with fall-back security. Fall-back ...
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive a...