A secret-shared shuffle (SSS) protocol permutes a secret-shared vector using a random secret permutation. It has found numerous applications, however, it is also an expensive operation and often a performance bottleneck. Chase et al. (Asiacrypt\u2720) recently proposed a highly efficient semi-honest two-party SSS protocol known as the CGP protocol. It utilizes purposely designed pseudorandom correlations that facilitate a communication-efficient online shuffle phase. That said, semi-honest security is insufficient in many real-world application scenarios since shuffle is usually used for highly sensitive applications. Considering this, recent works (CANS\u2721, NDSS\u2722) attempted to enhance the CGP protocol with malicious security over a...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
In the context of secure computation, protocols with security against covert adversaries ensure that...
In a secret sharing scheme, a dealer, D, distributes shares of a secret, S among a set of n particip...
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random ...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute an...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protec...
Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and inv...
In TCC 2007, Adida and Wikström proposed a novel approach to shuffle, called a public shuffle, in wh...
This dissertation concerns the secure processing of distributed data by multi- ple terminals, using ...
Private set intersection (PSI) allows two parties, who each hold a set of items, to compute the inte...
We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure channels ...
For conventional secret sharing, if cheaters can submit possibly forged shares after observing share...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
In the context of secure computation, protocols with security against covert adversaries ensure that...
In a secret sharing scheme, a dealer, D, distributes shares of a secret, S among a set of n particip...
In secure multi-party shuffling, multiple parties, each holding an input, want to agree on a random ...
Together with masking, shuffling is one of the most frequently considered solutions to improve the s...
Abstract. We show how to obfuscate a secret shuffle of ciphertexts: shuffling becomes a public opera...
We show how to public-key obfuscate two commonly used shuffles: decryption shuffles which permute an...
Abstract. Together with masking, shuffling is one of the most fre-quently considered solutions to im...
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protec...
Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and inv...
In TCC 2007, Adida and Wikström proposed a novel approach to shuffle, called a public shuffle, in wh...
This dissertation concerns the secure processing of distributed data by multi- ple terminals, using ...
Private set intersection (PSI) allows two parties, who each hold a set of items, to compute the inte...
We consider verifiable secret sharing (VSS) and multiparty computation (MPC) in the secure channels ...
For conventional secret sharing, if cheaters can submit possibly forged shares after observing share...
We consider the problem of designing scalable, robust protocols for computing statistics about sensi...
In the context of secure computation, protocols with security against covert adversaries ensure that...
In a secret sharing scheme, a dealer, D, distributes shares of a secret, S among a set of n particip...