Introducing small errors in the lattice-based key exchange protocols, although it is resistant to quantum computing attacks, will cause both...
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher,...
Introducing small errors in the lattice-based key exchange protocols, although it is resistant to quantum computing attacks, will cause both...
The rectangle attack has shown to be a very powerful form of cryptanalysis against block ciphers. Given a rectangle distinguisher,...
Recent works to improve privacy and auditability in permissioned blockchains like Hyperledger Fabric rely on Idemix, the only anonymous credential...
Recent works to improve privacy and auditability in permissioned blockchains like Hyperledger Fabric rely on Idemix, the only anonymous credential...
Anonymous attribute-based credentials (ABCs) are a powerful tool allowing users to authenticate while maintaining privacy. When instantiated from structure-preserving signatures...
Anonymous attribute-based credentials (ABCs) are a powerful tool allowing users to authenticate while maintaining privacy. When instantiated from structure-preserving signatures...
We study the problem of private set union in the two-party setting, providing several new constructions. We consider the case...
Secure aggregation on user private data with the aid of an entrusted server provides strong privacy guarantees and has been...