![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Strong Known Related-Key Attacks and the Security of ECDSA
The classical related-key attack (RKA) model fails to capture some real world systems that introduce related secret keys by design. In some blockchain applications, public keys are generated in a way that th...
-
Chapter and Conference Paper
Blind Polynomial Evaluation and Data Trading
Data trading is an emerging business, in which data sellers provide buyers with, for example, their private datasets and get paid from buyers. In many scenarios, sellers prefer to sell pieces of data, such as ...
-
Chapter and Conference Paper
Making Private Function Evaluation Safer, Faster, and Simpler
In the problem of two-party private function evaluation (PFE), one party \(\mathsf {P}_{\mathsf {A}}\) ...