• Publications
  • Influence
Elliptic curves in cryptography
TLDR
In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems. Expand
  • 1,868
  • 117
  • PDF
Multiparty Computation from Somewhat Homomorphic Encryption
TLDR
We propose a general multiparty computation protocol secure against an active adversary corrupting up to $$n-1$$ of the n players. Expand
  • 788
  • 102
  • PDF
Homomorphic Evaluation of the AES Circuit
TLDR
We describe a working implementation of leveled homomorphic encryption without bootstrapping that can evaluate the AES-128 circuit in three different ways. Expand
  • 634
  • 58
  • PDF
Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes
TLDR
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size than Gentry’s original scheme. Expand
  • 741
  • 47
  • PDF
Secure Two-Party Computation is Practical
TLDR
In this paper we describe an implementation of the two-party case, using Yao's garbled circuits, and present various algorithmic protocol improvements. Expand
  • 636
  • 40
  • PDF
The Eta Pairing Revisited
TLDR
In this paper, we simplify and extend the Eta pairing, originally discovered in the setting of supersingular curves by Barreto , to ordinary curves. Expand
  • 440
  • 39
  • PDF
An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing
  • N. Smart
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • 20 June 2002
TLDR
An ID-based authenticated two pass key agreement protocol which makes use of the Weil pairing is presented. Expand
  • 419
  • 36
  • PDF
Pairings for Cryptographers
TLDR
Many research papers in pairing-based cryptography treat pairings as a ''black box''. Expand
  • 736
  • 34
  • PDF
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits
TLDR
In this paper we both resolve a number of open problems with SPDZ; and present several theoretical and practical improvements to the protocol. Expand
  • 317
  • 34
  • PDF
Identity-based key agreement protocols from pairings
TLDR
In recent years, a large number of identity- based key agreement protocols from pairings have been proposed. Expand
  • 376
  • 29
  • PDF
...
1
2
3
4
5
...