Searched for: subject%3A%22Communication%255C%2Bcomplexity%22
(1 - 5 of 5)
document
Attema, T. (author), Cascudo, I. (author), Cramer, R. (author), Damgård, I. (author), Escudero, D. (author)
Compressed Sigma -Protocol Theory (CRYPTO 2020) presents an “alternative” to Bulletproofs that achieves the same communication complexity while adhering more elegantly to existing Sigma -protocol theory, which enables their techniques to be directly applicable to other widely used settings in the context of “plug & play” algorithmics....
conference paper 2022
document
Abspoel, M. (author), Attema, T. (author), Rambaud, M. (author)
We consider consensus protocols in the model that is most commonly considered for use in state machine replication, as initiated by Dwork-Lynch-Stockmeyer, then by Castro-Liskov in 1999 with “PBFT”. Such protocols guarantee, assuming n players out of which t < n/3 are maliciously corrupted, that the honest players output the same valid value...
conference paper 2021
document
Spini, G. (author), Zemor, G. (author)
article 2020
document
Veugen, P.J.M. (author), Blom, F. (author), de Hoogh, S.J.A. (author), Erkin, Z. (author)
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair...
article 2015
document
Veugen, P.J.M. (author)
In the field of signal processing in the encrypted domain, linear operations are usually easy to perform, whereas multiplications, and bitwise operations like comparison, are more costly in terms of computation and communication. These bitwise operations frequently require a decomposition of the secret value into bits. To minimize the...
article 2015
Searched for: subject%3A%22Communication%255C%2Bcomplexity%22
(1 - 5 of 5)