Sciweavers

IACR
2016
41views Biometrics» more  IACR 2016»
9 years 12 months ago
Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove
Abstract FIDO, German e-ID, Idemix and U-Prove constitute privacyenhanced public-key infrastructures allowing users to authenticate in an anonymous way. This however hampers timely...
Eric R. Verheul
IACR
2016
36views Biometrics» more  IACR 2016»
9 years 12 months ago
Better Preprocessing for Secure Multiparty Computation
We present techniques and protocols for the preprocessing of secure multiparty computation (MPC), focusing on the so-called SPDZ MPC scheme [19] and its derivatives [16,18,1]. Thes...
Carsten Baum, Ivan Damgård, Tomas Toft, Rasm...
IACR
2016
49views Biometrics» more  IACR 2016»
9 years 12 months ago
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Abstract. Since 2012, it is publicly known that the bitstream encryption feature of modern Xilinx FPGAs can be broken by side-channel analysis. Presented at CT-RSA 2012, using grap...
Amir Moradi, Tobias Schneider
IACR
2016
42views Biometrics» more  IACR 2016»
9 years 12 months ago
On Garbling Schemes With And Without Privacy
Abstract. In recent years, a lot of progress has been made on speeding up Actively-secure Twoparty Function Evaluation (SFE) using Garbled Circuits. For a given level of security, ...
Carsten Baum
IACR
2016
48views Biometrics» more  IACR 2016»
9 years 12 months ago
A Memory Encryption Engine Suitable for General Purpose Processors
Cryptographic protection of memory is an essential ingredient for any technology that allows a closed computing system to run software in a trustworthy manner and handle secrets, ...
Shay Gueron
IACR
2016
49views Biometrics» more  IACR 2016»
9 years 12 months ago
Valiant's Universal Circuit is Practical
Universal circuits (UCs) can be programmed to evaluate any circuit of a given size k. They provide elegant solutions in various application scenarios, e.g. for private function eva...
Ágnes Kiss, Thomas Schneider 0003
IACR
2016
42views Biometrics» more  IACR 2016»
9 years 12 months ago
On Post-Compromise Security
In this work we study communication with a party whose secrets have already been compromised. At first sight, it may seem impossible to provide any type of security in this scena...
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
IACR
2016
40views Biometrics» more  IACR 2016»
9 years 12 months ago
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
Outsourcing data to remote storage servers has become more and more popular, but the related security and privacy concerns have also been raised. To protect the pattern in which a...
Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao
IACR
2016
33views Biometrics» more  IACR 2016»
9 years 12 months ago
Computing Private Set Operations with Linear Complexities
Private set operation (PSO) protocols provide a natural way of securely performing operations on data sets, such that crucial details of the input sets are not revealed. Such proto...
Alex Davidson, Carlos Cid