Skip to main content

previous disabled Page of 2
and
  1. Article

    Open Access

    Vitamin D3 supplementation and treatment outcomes in patients with depression (D3-vit-dep)

    To examine whether vitamin D supplementation in patients with depression would result in a reduction in Hamilton D-17 depression score (primary outcome) at 3 and 6 months compared to controls and to explore th...

    Jens Peter Hansen, Manan Pareek, Allan Hvolby, Anne Schmedes in BMC Research Notes (2019)

  2. Article

    Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first ...

    Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft in Journal of Cryptology (2019)

  3. No Access

    Chapter and Conference Paper

    Confidential Benchmarking Based on Multiparty Computation

    We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers’ confidential performance data against a large representative set of confide...

    Ivan Damgård, Kasper Damgård, Kurt Nielsen in Financial Cryptography and Data Security (2017)

  4. Chapter and Conference Paper

    Better Preprocessing for Secure Multiparty Computation

    We present techniques and protocols for the preprocessing of secure multiparty computation (MPC), focusing on the so-called SPDZ MPC scheme [14] and its derivatives [1, 11, 13]. These MPC schemes consist of a so-...

    Carsten Baum, Ivan Damgård, Tomas Toft in Applied Cryptography and Network Security (2016)

  5. Article

    Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t∈{0,1} of length n, while Bob has a pattern p∈{0,1} of length m. The goal is for Bob to (only) learn where h...

    Carmit Hazay, Tomas Toft in Journal of Cryptology (2014)

  6. No Access

    Chapter and Conference Paper

    An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation

    Recent developments in Multi-party Computation (MPC) has resulted in very efficient protocols for dishonest majority in the preprocessing model. In particular, two very promising protocols for Boolean circuits...

    Ivan Damgård, Rasmus Lauritsen, Tomas Toft in Security and Cryptography for Networks (2014)

  7. No Access

    Chapter and Conference Paper

    A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation

    Secure multiparty computation (MPC) – computation on distributed, private inputs – has been studied for thirty years. This includes “one shot” applications as well as reactive tasks, where the exact computatio...

    Tomas Toft in Information Security and Cryptology -- ICISC 2013 (2014)

  8. Article

    Open Access

    Privacy-preserving distributed clustering

    Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a d...

    Zekeriya Erkin, Thijs Veugen, Tomas Toft in EURASIP Journal on Information Security (2013)

  9. No Access

    Chapter and Conference Paper

    Secure Equality and Greater-Than Tests with Sublinear Online Complexity

    Secure multiparty computation (MPC) allows multiple parties to evaluate functions without disclosing the private inputs. Secure comparisons (testing equality and greater-than) are important primitives required...

    Helger Lipmaa, Tomas Toft in Automata, Languages, and Programming (2013)

  10. No Access

    Article

    High-performance secure multi-party computation for data mining applications

    Secure multi-party computation (MPC) is a technique well suited for privacy-preserving data mining. Even with the recent progress in two-party computation techniques such as fully homomorphic encryption, gener...

    Dan Bogdanov, Margus Niitsoo, Tomas Toft in International Journal of Information Secur… (2012)

  11. No Access

    Chapter and Conference Paper

    Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first ...

    Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin in Topics in Cryptology – CT-RSA 2012 (2012)

  12. No Access

    Chapter and Conference Paper

    Secure Computation, I/O-Efficient Algorithms and Distributed Signatures

    We consider a setting where a set of n players use a set of m servers to store a large, private data set. Later the players decide on functions they want to compute on the data without the servers needing to know...

    Ivan Damgård, Jonas Kölker, Tomas Toft in Topics in Cryptology – CT-RSA 2012 (2012)

  13. No Access

    Chapter and Conference Paper

    On Secure Two-Party Integer Division

    We consider the problem of secure integer division: given two Paillier encryptions of ℓ-bit values n and d, determine an encryption of $\lfloo...

    Morten Dahl, Chao Ning, Tomas Toft in Financial Cryptography and Data Security (2012)

  14. Chapter and Conference Paper

    Sub-linear, Secure Comparison with Two Non-colluding Parties

    The classic problem in the field of secure computation is Yao’s millionaires’ problem; we consider two new protocols solving a variation of this: a number of parties, P 1,..., P ...

    Tomas Toft in Public Key Cryptography – PKC 2011 (2011)

  15. No Access

    Chapter and Conference Paper

    Linear, Constant-Rounds Bit-Decomposition

    When performing secure multiparty computation, tasks may often be simple or difficult depending on the representation chosen. Hence, being able to switch representation efficiently may allow more efficient pro...

    Tord Reistad, Tomas Toft in Information, Security and Cryptology – ICISC 2009 (2010)

  16. Chapter and Conference Paper

    Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    We propose a dedicated protocol for the highly motivated problem of secure two-party pattern matching: Alice holds a text t ∈ {0,1}*. of length n, while Bob has a pattern p ∈ {0,1}*. of length m. The goal is for ...

    Carmit Hazay, Tomas Toft in Advances in Cryptology - ASIACRYPT 2010 (2010)

  17. No Access

    Chapter and Conference Paper

    Secret Sharing Comparison by Transformation and Rotation

    Given any linear secret sharing scheme with a multiplication protocol, we show that a given set of players holding shares of two values ...

    Tord Ingolf Reistad, Tomas Toft in Information Theoretic Security (2009)

  18. No Access

    Chapter and Conference Paper

    Privacy-Preserving Face Recognition

    Face recognition is increasingly deployed as a means to unobtrusively verify the identity of people. The widespread use of biometrics raises important privacy concerns, in particular if the biometric matching ...

    Zekeriya Erkin, Martin Franz, Jorge Guajardo in Privacy Enhancing Technologies (2009)

  19. No Access

    Chapter and Conference Paper

    Secure Multiparty Computation Goes Live

    In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used.

    Peter Bogetoft, Dan Lund Christensen in Financial Cryptography and Data Security (2009)

  20. No Access

    Chapter and Conference Paper

    Solving Linear Programs Using Multiparty Computation

    Solving linear programming (LP) problems can be used to solve many different types of problems. Immediate examples include certain types of auctions as well as benchmarking. However, the input data may origina...

    Tomas Toft in Financial Cryptography and Data Security (2009)

previous disabled Page of 2