International audienceWe formally define the primitive of encryption switching protocol (ESP), allowing to switch between two encryption schemes. Intuitively, this two-party protocol converts given ciphertexts from one scheme into ciphertexts of the same messages under the other scheme, for any polynomial number of switches, in any direction. Although ESP is a special kind of two-party computation protocol, it turns out that ESP implies general two-party computation (2-PC) under natural conditions. In particular, our new paradigm is tailored to the evaluation of functions over rings. Indeed, assuming the compatibility of two additively and multiplicatively homomorphic encryption schemes, switching ciphertexts makes it possible to efficientl...
We devise multi-party computation protocols for general secure function evaluation with the property...
Abstract—We study the composition of security protocols when protocols share secrets such as keys. W...
International audienceCan Bob give Alice his decryption secret and be convinced that she will not gi...
We formally define the primitive of encryption switching protocol (ESP), allowing to switch between t...
International audienceAt CRYPTO 2016, Couteau, Peters and Pointcheval introduced a new primitive cal...
At CRYPTO 2016, Couteau, Peters and Pointcheval introduced a new primitive called Encryption Switch...
The recent notion of encryption switching protocol (ESP) allows two players to obliviously switch be...
Multikey fully homomorphic encryption proposed by Lopez-Alt et al. (STOC12) is a significant primiti...
We present the design and implementation of a compiler that automatically generates protocols that p...
Protocols for secure two-party computation enable a pair of parties to compute a function of their i...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Protocols for secure multi-party computation are commonly composed of different sub-protocols, combi...
We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PK...
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive ad-vers...
Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, name...
We devise multi-party computation protocols for general secure function evaluation with the property...
Abstract—We study the composition of security protocols when protocols share secrets such as keys. W...
International audienceCan Bob give Alice his decryption secret and be convinced that she will not gi...
We formally define the primitive of encryption switching protocol (ESP), allowing to switch between t...
International audienceAt CRYPTO 2016, Couteau, Peters and Pointcheval introduced a new primitive cal...
At CRYPTO 2016, Couteau, Peters and Pointcheval introduced a new primitive called Encryption Switch...
The recent notion of encryption switching protocol (ESP) allows two players to obliviously switch be...
Multikey fully homomorphic encryption proposed by Lopez-Alt et al. (STOC12) is a significant primiti...
We present the design and implementation of a compiler that automatically generates protocols that p...
Protocols for secure two-party computation enable a pair of parties to compute a function of their i...
Abstract. We show an efficient secure two-party protocol, based on Yao’s construction, which provide...
Protocols for secure multi-party computation are commonly composed of different sub-protocols, combi...
We revisit the notion of additively homomorphic encryption with a double decryption mechanism (DD-PK...
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive ad-vers...
Recently, Aumann and Lindell introduced a new realistic security model for secure compu-tation, name...
We devise multi-party computation protocols for general secure function evaluation with the property...
Abstract—We study the composition of security protocols when protocols share secrets such as keys. W...
International audienceCan Bob give Alice his decryption secret and be convinced that she will not gi...