Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Differentially-Private Distributed Machine Learning with Partial Worker Attendance: A Flexible and Efficient Approach

    In distributed machine learning, multiple machines or workers collaborate to train a model. However, prior research in cross-silo distributed learning with differential privacy has the drawback of requiring al...

    Le Trieu Phong, Tran Thi Phuong in The 12th Conference on Information Technol… (2023)

  2. No Access

    Chapter and Conference Paper

    A New Secure Matrix Multiplication from Ring-LWE

    Matrix multiplication is one of the most basic and useful operations in statistical calculations and machine learning. When the matrices contain sensitive information and the computation has to be carried out ...

    Lihua Wang, Yoshinori Aono, Le Trieu Phong in Cryptology and Network Security (2018)

  3. No Access

    Article

    Anonymous and leakage resilient IBE and IPE

    We construct identity-based encryption and inner product encryption schemes under the decision linear assumption. Their private user keys are leakage-resilient in several scenarios. In particular, ...

    Kaoru Kurosawa, Le Trieu Phong in Designs, Codes and Cryptography (2017)

  4. No Access

    Chapter and Conference Paper

    Privacy-Preserving Deep Learning: Revisited and Enhanced

    We build a privacy-preserving deep learning system in which many learning participants perform neural network-based deep learning over a combined dataset of all, without actually revealing the participants’ lo...

    Le Trieu Phong, Yoshinori Aono in Applications and Techniques in Information… (2017)

  5. No Access

    Chapter and Conference Paper

    Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers

    Assume that there are L local datasets distributed among L owners (also called trainers hereafter). The problem is as follows: the owners wish to apply a machine learning method over the combined dataset of all t...

    Le Trieu Phong in Network and System Security (2017)

  6. No Access

    Chapter and Conference Paper

    A Generic yet Efficient Method for Secure Inner Product

    Secure inner product, namely the computation of inner product whose terms are all in encrypted form, is the central technique for various privacy-preserving applications. In this paper, we propose a generic ye...

    Lihua Wang, Takuya Hayashi, Yoshinori Aono, Le Trieu Phong in Network and System Security (2017)

  7. No Access

    Chapter and Conference Paper

    IBE Under \(k\) -LIN with Shorter Ciphertexts and Private Keys

    Many identity-based encryption schemes under the \(k\) k ...

    Kaoru Kurosawa, Le Trieu Phong in Information Security and Privacy (2015)

  8. No Access

    Chapter and Conference Paper

    Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited

    While the hybrid public key encryption scheme of Kurosawa and Desmedt (CRYPTO 2004) is provably secure against chosen ciphertext attacks (namely, IND-CCA-secure), its associated key encapsulation mechanism (KE...

    Kaoru Kurosawa, Le Trieu Phong in Progress in Cryptology – AFRICACRYPT 2014 (2014)

  9. Chapter and Conference Paper

    Leakage Resilient IBE and IPE under the DLIN Assumption

    In this paper, we show identity-based encryption (IBE) and inner product encryption (IPE) schemes which achieve the maximum-possible leakage rate 1 − o(1). These schemes are secure under the decision linear (DLIN...

    Kaoru Kurosawa, Le Trieu Phong in Applied Cryptography and Network Security (2013)

  10. No Access

    Chapter and Conference Paper

    Key-Private Proxy Re-encryption under LWE

    Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being ...

    Yoshinori Aono, Xavier Boyen, Le Trieu Phong in Progress in Cryptology – INDOCRYPT 2013 (2013)

  11. No Access

    Chapter and Conference Paper

    Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions

    Verifiable random functions (VRF) and selectively convertible undeniable signature (SCUS) schemes were proposed independently in the literature. In this paper, we observe that they are tightly related. This di...

    Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong in Information Security and Privacy (2012)

  12. Chapter and Conference Paper

    Generic Fully Simulatable Adaptive Oblivious Transfer

    We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable security, from various well-known assumptions such as DDH, DLIN (and more generally, d-linear), QR, DCR. To this end, we pr...

    Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong in Applied Cryptography and Network Security (2011)

  13. No Access

    Chapter and Conference Paper

    Leakage Resilient Strong Key-Insulated Signatures in Public Channel

    Key-insulation aims at minimizing (i.e., compartmentalizing) the damage of users from key exposures, and traditionally requires a private channel of communication between a user and a semi-trusted party called...

    Le Trieu Phong, Shin’ichiro Matsuo, Moti Yung in Trusted Systems (2011)

  14. No Access

    Chapter and Conference Paper

    Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption

    At Asiacrypt 2009, Kurosawa and Nojima showed a fully simulatable adaptive oblivious transfer (OT) protocol under the DDH assumption in the standard model. However, Green and Hohenberger pointed out that the c...

    Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong in Security and Cryptography for Networks (2010)

  15. No Access

    Chapter and Conference Paper

    Leakage-Resilient RFID Authentication with Forward-Privacy

    Low power devices, such as smart-card and RFID-tags, will be used around our life including in commercial and financial activities. A prime application of such devices is entity authentication in pervasive env...

    Shin’ichiro Matsuo, Le Trieu Phong in Radio Frequency Identification: Security a… (2010)

  16. No Access

    Chapter and Conference Paper

    Provably Secure Convertible Undeniable Signatures with Unambiguity

    This paper shows some efficient and provably-secure convertible undeniable signature schemes (with both selective conversion and all conversion), in the standard model and discrete logarithm setting. They furt...

    Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata in Security and Cryptography for Networks (2010)

  17. No Access

    Chapter and Conference Paper

    A Framework for Constructing Convertible Undeniable Signatures

    In this paper, we propose a framework for constructing convertible undeniable signatures from weakly-secure standard signatures. We then present a concrete instantiation employing a standard signature scheme rece...

    Ryo Kikuchi, Le Trieu Phong, Wakaha Ogata in Provable Security (2010)

  18. No Access

    Chapter and Conference Paper

    New RSA-Based (Selectively) Convertible Undeniable Signature Schemes

    In this paper, we design and analyze some new and practical (selectively) convertible undeniable signature (SCUS) schemes in both random oracle and standard model, which enjoy several merits over existing sche...

    Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata in Progress in Cryptology – AFRICACRYPT 2009 (2009)