Conference Paper
Simplified VSS and FactTrack Multiparty Computations with Applications to Threshold Cryptography.
Source: DBLP
 Citations (0)
 Cited In (23)

Conference Paper: Reduce to the Max: A Simple Approach for MassiveScale PrivacyPreserving Collaborative Network Measurements (Short Paper).
[Show abstract] [Hide abstract]
ABSTRACT: Privacypreserving techniques for distributed computation have been proposed recently as a promising framework in collaborative interdomain network monitoring. Several different approaches exist to solve such class of problems, e.g., Homomorphic Encryption (HE) and Secure Multiparty Computation (SMC) based on Shamir’s Secret Sharing algorithm (SSS). Such techniques are complete from a computationtheoretic perspective: given a set of private inputs, it is possible to perform arbitrary computation tasks without revealing any of the intermediate results. In this paper we advocate the use of “elementary” (as opposite to “complete“) Secure Multiparty Computation (ESMC) procedures for traffic monitoring. ESMC supports only simple computations with private input and public output, i.e., they can not handle secret input nor secret (intermediate) output. The proposed simplification brings a dramatic reduction in complexity and enables massivescale implementation with acceptable delay and overhead. Notwithstanding their simplicity, we claim that a simple additive ESMC scheme is sufficient to perform many computation tasks of practical relevance to collaborative network monitoring, such as anonymous publishing and set operations.Traffic Monitoring and Analysis  Third International Workshop, TMA 2011, Vienna, Austria, April 27, 2011. Proceedings; 01/2011  [Show abstract] [Hide abstract]
ABSTRACT: Privacypreserving set operations and set intersection in particular are a popular research topic. Despite a large body of literature, the great majority of the available solutions are twoparty protocols and are not composable. In this work we design a comprehensive suite of secure multiparty protocols for set and multiset operations that are composable, do not assume any knowledge of the sets by the parties carrying out the secure computation, and can be used for secure outsourcing. All of our protocols have communication and computation complexity of O(m log m) for sets or multisets of size m, which compares favorably with prior work. Furthermore, we are not aware of any results that realize composable operations. Our protocols are secure in the information theoretic sense and are designed to minimize the round complexity.IACR Cryptology ePrint Archive. 01/2011; 2011:464. 
Conference Paper: On the use of shamir's secret sharing against sidechannel analysis
[Show abstract] [Hide abstract]
ABSTRACT: At CHES 2011 Goubin and Martinelli described a new countermeasure against sidechannel analysis for AES based on Shamir's secretsharing scheme. In the present paper, we exhibit a flaw in this scheme and we show that it is always theoretically broken by a firstorder sidechannel analysis. As a consequence of this attack, only a slight adaptation of the scheme proposed by BenOr et al.at STOC in 1988 can securely process multiplications on data shared with Shamir's technique. In the second part of this paper, we propose an improvement of this scheme that leads to a complexity ${\cal \tilde O}(d^2)$ instead of ${\cal O}(d^3)$, where d is the number of shares per data.Proceedings of the 11th international conference on Smart Card Research and Advanced Applications; 11/2012
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.