Search
Search Results
-
Partial key exposure attack on RSA using some private key blocks
RSA is a well-known cryptosystem in public-key cryptography and the strength of the cryptosystem depends on the hardness of factoring large integers....
-
Maliciously circuit-private multi-key FHE and MPC based on LWE
In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our...
-
Atomic cross-chain swap based on private key exchange
Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two...
-
Small Private Key Attack Against a Family of RSA-Like Cryptosystems
Let \(N=pq\) be the product of two balanced... -
EMPSI: Efficient multiparty private set intersection (with cardinality)
Multiparty private set intersection (PSI) allows several parties, each holding a set of elements, to jointly compute the intersection without leaking...
-
Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication
Public key authentication (PKA) has been deployed in various services to provide stronger authentication to users. In PKA, a user manages private... -
Asymmetric Key Cryptography
Asymmetric encryption is a brand-new, highly advanced encryption method that employs two keys. Public and private keys are the names given to these... -
BVDFed: Byzantine-resilient and verifiable aggregation for differentially private federated learning
Federated Learning (FL) has emerged as a powerful technology designed for collaborative training between multiple clients and a server while...
-
Public and Private Key Cryptography
Please download the sample Excel files from for this chapter’s exercises. -
Private Set Operations from Multi-query Reverse Private Membership Test
Private set operations allow two parties to perform secure computation on their private sets, including intersection, union and functions of... -
Efficient Private Multiset ID Protocols
Private-ID (PID) protocol enables two parties, each holding a private set of items, to privately compute a set of random universal identifiers (UID)... -
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures
SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three...
-
Differentially private federated learning with non-IID data
In Differentially Private Federated Learning (DPFL), gradient clip** and random noise addition disproportionately affect statistically...
-
Unbalanced private set intersection with linear communication complexity
The private set intersection (PSI) protocol allows two parties holding a set of integers to compute the intersection of their sets without revealing...
-
The Design and Implementation of Blockchain-Assisted User Public-Private Key Generation Method
The rapid development of network technology has brought new challenges to data security. As the first gateway of a certain mobile internet system,... -
Hiding the input-size in multi-party private set intersection
Ateniese et al. (PKC 2011) introduced the concept of size-hiding private set intersection (SHI-PSI) and proposed a construction for two parties. The...
-
Differentially private multi-agent constraint optimization
Distributed constraint optimization (DCOP) is a framework in which multiple agents with private constraints (or preferences) cooperate to achieve a...
-
Data Security-Based Routing in MANETs Using Key Management Mechanism
Multicast standalone networks are inclusive of wireless nodes that are portable and can operate without framework. Nodes in an MANET can communicate...
-
Authentication and Key Establishment in WSN Based on Key Predistribution
AbstractA new authentication and key establishment method for wireless sensor networks (WSNs) is proposed based on the modification of the key...
-
Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model
Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public...