We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Distributed Protocols for Oblivious Transfer and Polynomial Evaluation

    A secure multiparty computation (MPC) allows several parties to compute a function over their inputs while kee** their inputs private. In its basic...
    Aviad Ben Arie, Tamir Tassa in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  2. Unconditionally Secure Oblivious Polynomial Evaluation: A Survey and New Results

    Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, ℛ to learn an evaluation f ( α ), of a sender, 𝒮’s polynomial ( f ( x ...

    Louis Cianciullo, Hossein Ghodosi in Journal of Computer Science and Technology
    Article 31 March 2022
  3. Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography

    Distributed oblivious polynomial evaluation (DOPE) is a variant of two-party computation where a sender party...
    Amirreza Hamidi, Hossein Ghodosi in Information and Communications Security
    Conference paper 2023
  4. Fair Distributed Oblivious Polynomial Evaluation via Bitcoin Deposits: Compute-as-a-Service

    Distributed oblivious polynomial evaluation (DOPE) is a special case of two-party computation where the sender party...
    Amirreza Hamidi, Hossein Ghodosi in Secure IT Systems
    Conference paper 2024
  5. MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation

    Oblivious Polynomial Evaluation (OPE) schemes are interactive protocols between a sender with a private polynomial and a receiver with a private...
    Malika Izabachène, Anca Nitulescu, ... David Pointcheval in Security and Cryptography for Networks
    Conference paper 2022
  6. Homomorphic Polynomial Evaluation Using Galois Structure and Applications to BFV Bootstrap**

    BGV and BFV are among the most widely used fully homomorphic encryption (FHE) schemes. Both schemes have a common plaintext space, with a rich...
    Hiroki Okada, Rachel Player, Simon Pohmann in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  7. Private Polynomial Commitments and Applications to MPC

    Polynomial commitment schemes allow a prover to commit to a polynomial and later reveal the evaluation of the polynomial on an arbitrary point along...
    Rishabh Bhadauria, Carmit Hazay, ... Yupeng Zhang in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  8. Modular Polynomial Multiplication Using RSA/ECC Coprocessor

    Modular polynomial multiplication is a core and costly operation of ideal lattice-based schemes. In the context of embedded devices, previous works...
    Aurélien Greuet, Simon Montoya, Clémence Vermeersch in Network and System Security
    Conference paper 2023
  9. Lattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency

    Polynomial commitments schemes are a powerful tool that enables one party to commit to a polynomial p of degree d , and prove that the committed...

    Giacomo Fenzi, Hossein Moghaddas, Ngoc Khanh Nguyen in Journal of Cryptology
    Article Open access 10 July 2024
  10. Efficient Transparent Polynomial Commitments for zk-SNARKs

    This paper proposes a new efficient transparent polynomial commitment scheme. In a polynomial commitment scheme, a prover commits a polynomial and a...
    Sungwook Kim, Sungju Kim, ... Hyunok Oh in Computer Security – ESORICS 2023
    Conference paper 2024
  11. SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions

    Recent works on lattice-based extractable polynomial commitments can be grouped into two classes: (i) non-interactive constructions that stem from...
    Martin R. Albrecht, Giacomo Fenzi, ... Ngoc Khanh Nguyen in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  12. Exact subdomain and embedded interface polynomial integration in finite elements with planar cuts

    The implementation of discontinuous functions occurs in many of today’s state-of-the-art partial differential equation solvers. However, in finite...

    Eugenio Aulisa, Jonathon Loftin in Numerical Algorithms
    Article 23 February 2023
  13. Polynomial Analysis of Modular Arithmetic

    The modular polynomial abstract domain, MPAD, is proposed, whose invariants are systems of polynomial equations that hold modulo a power of 2. Its...
    Thomas Seed, Chris Coppins, ... Neil Evans in Static Analysis
    Conference paper 2023
  14. Polynomial XL: A Variant of the XL Algorithm Using Macaulay Matrices over Polynomial Rings

    Solving a system of m multivariate quadratic equations in n variables over finite fields (the MQ problem) is one of the important problems in the...
    Hiroki Furue, Momonari Kudo in Post-Quantum Cryptography
    Conference paper 2024
  15. Protein acetylation sites with complex-valued polynomial model

    Protein acetylation refers to a process of adding acetyl groups (CH3CO-) to lysine residues on protein chains. As one of the most commonly used...

    Wenzheng Bao, Bin Yang in Frontiers of Computer Science
    Article 22 January 2024
  16. Algorithmic Views of Vectorized Polynomial Multipliers – NTRU

    The lattice-based post-quantum cryptosystem NTRU is used by Google for protecting Google’s internal communication. In NTRU, polynomial multiplication...
    Han-Ting Chen, Yi-Hua Chung, ... Bo-Yin Yang in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  17. Dew: A Transparent Constant-Sized Polynomial Commitment Scheme

    We construct a polynomial commitment scheme with constant (i.e., independent of the degree) sized evaluation proofs and logarithmic (in the degree)...
    Arasu Arun, Chaya Ganesh, ... Sriram Sridhar in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  18. Breaking SIDH in Polynomial Time

    We show that we can break SIDH in (classical) polynomial time, even with a random starting curve...
    Conference paper 2023
  19. ECC based novel color image encryption methodology using primitive polynomial

    With the increasing use of digital images, there is a growing need for secure and efficient image encryption algorithms to ensure their...

    P. L. Sharma, Shalini Gupta, ... Arun Kumar Sharma in Multimedia Tools and Applications
    Article 22 February 2024
Did you find what you were looking for? Share feedback.