Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE (English)
- New search for: Xu, Peiying
- New search for: Wang, Li-Ping
- New search for: Simpson, Leonie
- Further information on Simpson, Leonie:
- https://orcid.org/https://orcid.org/0000-0001-8434-9741
- New search for: Rezazadeh Baee, Mir Ali
- Further information on Rezazadeh Baee, Mir Ali:
- https://orcid.org/https://orcid.org/0000-0003-1575-7287
- New search for: Xu, Peiying
- New search for: Wang, Li-Ping
In:
Information Security and Privacy
: 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5–7, 2023, Proceedings
;
Chapter: 12
;
248-269
;
2023
- Article/Chapter (Book) / Electronic Resource
-
Title:Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE
-
Additional title:Lect.Notes Computer
-
Contributors:Simpson, Leonie ( editor ) / Rezazadeh Baee, Mir Ali ( editor ) / Xu, Peiying ( author ) / Wang, Li-Ping ( author )
-
Conference:Australasian Conference on Information Security and Privacy ; 2023 ; Brisbane, QLD, Australia
-
Published in:Information Security and Privacy : 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5–7, 2023, Proceedings ; Chapter: 12 ; 248-269Lecture Notes in Computer Science ; 13915 ; 248-269
-
Publisher:
- New search for: Springer Nature Switzerland
-
Place of publication:Cham
-
Publication date:2023-06-15
-
Size:22 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Improved Differential Cryptanalysis on SPECK Using Plaintext StructuresFeng, Zhuohui / Luo, Ye / Wang, Chao / Yang, Qianqian / Liu, Zhiquan / Song, Ling et al. | 2023
- 2
-
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathbb {F}_p$$\end{document}-Based CiphersXu, Zeyu / Chen, Shiyao / Wang, Meiqin / Wei, Puwen et al. | 2023
- 3
-
A New Correlation Cube Attack Based on Division PropertyChe, Cheng / Tian, Tian et al. | 2023
- 4
-
The Triangle Differential CryptanalysisXie, Xiaofeng / Tian, Tian et al. | 2023
- 5
-
Key Recovery Attacks on Grain-Like Keystream Generators with Key InjectionBeighton, Matthew / Bartlett, Harry / Simpson, Leonie / Wong, Kenneth Koon-Ho et al. | 2023
- 6
-
Related-Cipher Attacks: Applications to Ballet and ANTMao, Yongxia / Wu, Wenling / Zheng, Yafei / Zhang, Lei et al. | 2023
- 7
-
Cryptanalysis of SPEEDYWang, Jinliang / Niu, Chao / Liu, Qun / Li, Muzhou / Preneel, Bart / Wang, Meiqin et al. | 2023
- 8
-
Reconsidering Generic Composition: The Modes A10, A11 and A12 are InsecureBerti, Francesco et al. | 2023
- 9
-
Exploring Formal Methods for Cryptographic Hash Function ImplementationsMouha, Nicky et al. | 2023
- 10
-
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGMLoh, Jia-Chng / Guo, Fuchun / Susilo, Willy / Yang, Guomin et al. | 2023
- 11
-
Compact Password Authenticated Key Exchange from Group ActionsIshibashi, Ren / Yoneyama, Kazuki et al. | 2023
- 12
-
Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HEXu, Peiying / Wang, Li-Ping et al. | 2023
- 13
-
Identity-Based Encryption from Lattices Using Approximate TrapdoorsIzabachène, Malika / Prabel, Lucas / Roux-Langlois, Adeline et al. | 2023
- 14
-
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its ApplicationsIshizaka, Masahito / Fukushima, Kazuhide et al. | 2023
- 15
-
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with ErrorsFan, Jingjing / Lu, Xingye / Au, Man Ho et al. | 2023
- 16
-
Quantum-Access Security of Hash-Based Signature SchemesYuan, Quan / Tibouchi, Mehdi / Abe, Masayuki et al. | 2023
- 17
-
Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle ModelFoo, Ernest / Li, Qinyi et al. | 2023
- 18
-
Ghidle: Efficient Large-State Block Ciphers for Post-quantum SecurityNakahashi, Motoki / Shiba, Rentaro / Anand, Ravi / Rahman, Mostafizar / Sakamoto, Kosei / Liu, Fukang / Isobe, Takanori et al. | 2023
- 19
-
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric CiphersChen, Huiqin / Li, Yongqiang / Abla, Parhat / Li, Zhiran / Jiao, Lin / Wang, Mingsheng et al. | 2023
- 20
-
Memory-Efficient Quantum Information Set Decoding AlgorithmKimura, Naoto / Takayasu, Atsushi / Takagi, Tsuyoshi et al. | 2023
- 21
-
CSI-SharK: CSI-FiSh with Sharing-friendly KeysAtapoor, Shahla / Baghery, Karim / Cozzo, Daniele / Pedersen, Robi et al. | 2023
- 22
-
Practical Verifiable Random Function with RKA SecurityYuen, Tsz Hon / Pan, Shimin / Huang, Sheng / Zhang, Xiaoting et al. | 2023
- 23
-
Statistically Consistent Broadcast Authenticated Encryption with Keyword SearchMukherjee, Sayantan et al. | 2023
- 24
-
Modular Design of KEM-Based Authenticated Key ExchangeBoyd, Colin / de Kock, Bor / Millerjord, Lise et al. | 2023
- 25
-
Reusable, Instant and Private Payment Guarantees for CryptocurrenciesMadhusudan, Akash / Sedaghat, Mahdi / Tiwari, Samarth / Cong, Kelong / Preneel, Bart et al. | 2023
- 26
-
BinAlign: Alignment Padding Based Compiler Provenance RecoveryIsmail, Maliha / Lin, Yan / Han, DongGyun / Gao, Debin et al. | 2023
- 27
-
Encrypted Network Traffic Classification with Higher Order Graph Neural NetworkOkonkwo, Zulu / Foo, Ernest / Hou, Zhe / Li, Qinyi / Jadidi, Zahra et al. | 2023