Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a polytime adversary, and allows n parties to actively secur...
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable security, from various well-known assumptions such as DDH, d-Linear, QR, DCR, and LWE. To t...
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...