Searched for: author:"Attema, T."
(1 - 19 of 19)
document
Attema, T. (author), Cramer, R. (author), Kohl, L. (author)
We show a lattice-based solution for commit-and-prove transparent circuit zero-knowledge (ZK) with polylog-communication, the first not depending on PCPs. We start from compressed Σ-protocol theory (CRYPTO 2020), which is built around basic Σ-protocols for opening an arbitrary linear form on a long secret vector that is compactly committed to....
conference paper 2021
document
Attema, T. (author), Ronald Cramer, R. (author), Rambaud, M. (author)
Recent developments in zero-knowledge have yielded various communication-efficient protocols for proving correctness of statements captured by arithmetic circuits. Since any relation can be translated into an arithmetic circuit relation, these primitives are extremely powerful and widely applied. However, this translation often comes at the cost...
conference paper 2021
document
Attema, T. (author), Bosman, J.W. (author), Neumann, N.M.P. (author)
Quantum key distribution (QKD) protocols allow for information theoretically secure distribution of (classical) cryptographic key material. However, due to practical limitations the performance of QKD implementations is somewhat restricted. For this reason, it is crucial to find optimal protocol parameters, while guaranteeing information...
article 2021
document
van Rest, J.H.C. (author), Attema, T. (author), Timan, T. (author), den Hollander, R.J.M. (author), van Voorthuisen, G.P. (author)
report 2021
document
Attema, T. (author), Gervasoni, N. (author), Marcus, M.J.H. (author), Spini, G. (author)
The advent of a full-scale quantum computer will severely impact most currently-used cryptographic systems. The most well-known aspect of this impact lies in the computational-hardness assumptions that underpin the security of most current public-key cryptographic systems: a quantum computer can factor integers and compute discrete logarithms in...
article 2021
document
Attema, T. (author), Worm, D. (author)
challenges.
report 2021
document
Attema, T. (author), Cramer, R. (author)
conference paper 2020
document
Attema, T. (author), Lyubashevsky, V. (author), Seiler, G. (author)
conference paper 2020
document
Neumann, N.M.P. (author), van Houte, R. (author), Attema, T. (author)
conference paper 2020
document
van Houte, R. (author), Mulderij, J. (author), Attema, T. (author), Chiscop, I. (author), Phillipson, F. (author)
article 2020
document
Attema, T. (author)
public lecture 2020
document
Veugen, P.J.M. (author), Attema, T. (author), Spini, G. (author)
We consider the problem of securely generating the keys of the Paillier crypto system [11] with (t; n) threshold decryption, without a trusted dealer. Nishide and Sakurai [10] describe a solution, secure in the malicious model. We use their ideas to make a simpler solution for the semi-honest model, and further introduce a few optimisations. We...
article 2019
document
Sangers, A. (author), van Heesch, M.P.P. (author), Attema, T. (author), Veugen, P.J.M. (author), Wiggerman, M. (author), Veldsink, J. (author), Bloemen, O. (author), Worm, D.T.H. (author)
Collaboration between financial institutions helps to improve detection of fraud. However, exchange of relevant data between these institutions is often not possible due to privacy constraints and data confidentiality. An important example of relevant data for fraud detection is given by a transaction graph, where the nodes represent bank accounts...
conference paper 2019
document
Attema, T. (author), Cramer, T. (author), Xing, C. (author)
article 2019
document
Sangers, A. (author), van Heesch, M.P.P. (author), Attema, T. (author), Veugen, P.J.M. (author), Wiggerman, M. (author), Veldsink, J. (author), Bloemen, O. (author), Worm, D.T.H. (author)
Collaboration between financial institutions helps to improve detection of fraud. However, exchange of relevant data between these institutions is often not possible due to privacy constraints and data confidentiality. An important example of relevant data for fraud detection is given by a transaction graph, where the nodes represent bank accounts...
public lecture 2019
document
Attema, T. (author), Kosgodagan Acharige, A. (author), Morales-Napoles, O. (author), Maljaars, J. (author)
A probabilistic model is developed to investigate the crack growth development in welded details of
article 2017
document
Attema, T. (author), van Maanen, P.P. (author), Meeuwissen, E. (author)
This paper concerns multi-agent models predicting Twitter trends. We use a step-wise approach to develop a novel agent-based model with the following properties: (1) it uses individual behavior parameters for a set of Twitter users and (2) it uses a retweet graph to model the underlying social network structure of these Twitter users to predict...
conference paper 2015
document
Attema, T. (author), Courage, W.M.G. (author), Maljaars, J. (author), van Meerveld, H. (author), Paulissen, J.H. (author), Pijpers, R.J.M. (author), Slobbe, A.T. (author)
This paper presents a monitoring and modelling methodology to assess the current and future conditions of steel bridges subjected to fatigue cracking. Steel bridges are subjected to fatigue cracking as a result of fluctuating stresses caused by the crossing of heavy vehicles. Specifically for orthotropic steel bridge decks, fatigue cracking is...
conference paper 2015
document
Phillipson, F. (author), Matthijssen, E.F. (author), Attema, T. (author)
Business continuity professionals try to deal with multiple aspects which influence the continuity of a company. The key product is a coherent system of measures which encompass detection, prevention and recovery. Choices made in one element of the system affect other elements as well as the continuity risks of the company. In complex...
article 2014
Searched for: author:"Attema, T."
(1 - 19 of 19)