![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Differentially-Private Distributed Machine Learning with Partial Worker Attendance: A Flexible and Efficient Approach
In distributed machine learning, multiple machines or workers collaborate to train a model. However, prior research in cross-silo distributed learning with differential privacy has the drawback of requiring al...
-
Chapter and Conference Paper
A New Secure Matrix Multiplication from Ring-LWE
Matrix multiplication is one of the most basic and useful operations in statistical calculations and machine learning. When the matrices contain sensitive information and the computation has to be carried out ...
-
Article
Anonymous and leakage resilient IBE and IPE
We construct identity-based encryption and inner product encryption schemes under the decision linear assumption. Their private user keys are leakage-resilient in several scenarios. In particular, ...
-
Chapter and Conference Paper
Privacy-Preserving Deep Learning: Revisited and Enhanced
We build a privacy-preserving deep learning system in which many learning participants perform neural network-based deep learning over a combined dataset of all, without actually revealing the participants’ lo...
-
Chapter and Conference Paper
Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers
Assume that there are L local datasets distributed among L owners (also called trainers hereafter). The problem is as follows: the owners wish to apply a machine learning method over the combined dataset of all t...
-
Chapter and Conference Paper
A Generic yet Efficient Method for Secure Inner Product
Secure inner product, namely the computation of inner product whose terms are all in encrypted form, is the central technique for various privacy-preserving applications. In this paper, we propose a generic ye...
-
Chapter and Conference Paper
IBE Under \(k\) -LIN with Shorter Ciphertexts and Private Keys
Many identity-based encryption schemes under the \(k\) k ...
-
Chapter and Conference Paper
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited
While the hybrid public key encryption scheme of Kurosawa and Desmedt (CRYPTO 2004) is provably secure against chosen ciphertext attacks (namely, IND-CCA-secure), its associated key encapsulation mechanism (KE...
-
Chapter and Conference Paper
Leakage Resilient IBE and IPE under the DLIN Assumption
In this paper, we show identity-based encryption (IBE) and inner product encryption (IPE) schemes which achieve the maximum-possible leakage rate 1 − o(1). These schemes are secure under the decision linear (DLIN...
-
Chapter and Conference Paper
Key-Private Proxy Re-encryption under LWE
Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being ...
-
Chapter and Conference Paper
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
Verifiable random functions (VRF) and selectively convertible undeniable signature (SCUS) schemes were proposed independently in the literature. In this paper, we observe that they are tightly related. This di...
-
Chapter and Conference Paper
Generic Fully Simulatable Adaptive Oblivious Transfer
We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable security, from various well-known assumptions such as DDH, DLIN (and more generally, d-linear), QR, DCR. To this end, we pr...
-
Chapter and Conference Paper
Leakage Resilient Strong Key-Insulated Signatures in Public Channel
Key-insulation aims at minimizing (i.e., compartmentalizing) the damage of users from key exposures, and traditionally requires a private channel of communication between a user and a semi-trusted party called...
-
Chapter and Conference Paper
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
At Asiacrypt 2009, Kurosawa and Nojima showed a fully simulatable adaptive oblivious transfer (OT) protocol under the DDH assumption in the standard model. However, Green and Hohenberger pointed out that the c...
-
Chapter and Conference Paper
Leakage-Resilient RFID Authentication with Forward-Privacy
Low power devices, such as smart-card and RFID-tags, will be used around our life including in commercial and financial activities. A prime application of such devices is entity authentication in pervasive env...
-
Chapter and Conference Paper
Provably Secure Convertible Undeniable Signatures with Unambiguity
This paper shows some efficient and provably-secure convertible undeniable signature schemes (with both selective conversion and all conversion), in the standard model and discrete logarithm setting. They furt...
-
Chapter and Conference Paper
A Framework for Constructing Convertible Undeniable Signatures
In this paper, we propose a framework for constructing convertible undeniable signatures from weakly-secure standard signatures. We then present a concrete instantiation employing a standard signature scheme rece...
-
Chapter and Conference Paper
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
In this paper, we design and analyze some new and practical (selectively) convertible undeniable signature (SCUS) schemes in both random oracle and standard model, which enjoy several merits over existing sche...