Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes - MaRDI portal

Public-Key Cryptosystems Based on Composite Degree Residuosity Classes

From MaRDI portal
Publication:4250764

DOI10.1007/3-540-48910-X_16zbMath0933.94027WikidataQ56287504 ScholiaQ56287504MaRDI QIDQ4250764

Pascal Paillier

Publication date: 17 June 1999

Published in: Advances in Cryptology — EUROCRYPT ’99 (Search for Journal in Brave)




Related Items

Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a ServiceRound-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard ModelOn the security of RSA textbook signature scheme on Paillier ciphertextAdaptive Simulation Security for Inner Product Functional EncryptionAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreA new distribution version of Boneh-Goh-Nissim cryptosystem : Security and performance analysisNew Ideas to Build Noise-Free Homomorphic CryptosystemsSimilarity Based Interactive Private Information RetrievalPrivacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic EncryptionCompact Lossy and All-but-One Trapdoor Functions from LatticeA Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third PartiesEnhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic EncryptionOutsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud IntegrationSpatial Bloom Filters: Enabling Privacy in Location-Aware ApplicationsCubic spline curve public key cryptographySAMBA: A Generic Framework for Secure Federated Multi-Armed BanditsRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelLattice-Based Group Encryption with Full Dynamicity and Message Filtering PolicyHiding the input-size in multi-party private set intersectionEfficient and privacy-preserving tree-based inference via additive homomorphic encryptionRobust Threshold Schemes Based on the Chinese Remainder TheoremA new public key cryptosystem over ℤn2*Multikey Fully Homomorphic Encryption and ApplicationsPublic-Key Cryptosystems with Primitive Power Roots of UnityFully-Simulatable Oblivious Set TransferEfficient Disjointness Tests for Private DatasetsPractical Secure Naïve Bayesian Classification Over Encrypted Big Data in CloudAsynchronous Multi-Party Computation with Quadratic CommunicationLossy Identification Schemes from Decisional RSATwo Generic Constructions of Probabilistic Cryptosystems and Their ApplicationsSimplified Submission of Inputs to ProtocolsNew Communication-Efficient Oblivious Transfer Protocols Based on PairingsHomomorphic Encryptions of Sums of GroupsGroup EncryptionPAChain: Private, Authenticated and Auditable Consortium BlockchainImproved Multiplication Triple Generation over Rings via RLWE-Based AHEWhen Is a Semi-honest Secure Multiparty Computation Valuable?Mathematical analysis and simulation of multiple keys and S-Boxes in a multinode network for secure transmissionAn applications of signed quadratic residues in public key cryptographyChosen Ciphertext Secure Keyed-Homomorphic Public-Key EncryptionEfficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRSTighter Reductions for Forward-Secure Signature SchemesNew Constructions and Applications of Trapdoor DDH GroupsCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsScalable Multi-party Private Set-IntersectionSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesLinearly Homomorphic Authenticated Encryption with Provable Correctness and Public VerifiabilityOn the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party ProtocolsA Framework for Constructing Convertible Undeniable SignaturesEfficient Confirmer Signatures from the “Signature of a Commitment” ParadigmFormal and Precise Analysis of Soundness of Several Shuffling SchemesEfficient Binary Conversion for Paillier Encrypted ValuesUnclonable Group IdentificationThe Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise AppearanceOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesSecure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious AdversariesA Watermarking Scheme in the Encrypted Domain for Watermarking ProtocolHash Functions from Sigma Protocols and Improvements to VSHPrivacy Preserving Sequential Pattern Mining in Data StreamFair Traceable Multi-Group SignaturesEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesEquivocal Blind Signatures and Adaptive UC-SecurityFast secure two-party ECDSA signingRound-optimal secure multi-party computationProvably Secure (Broadcast) Homomorphic SigncryptionPrivacy-Preserving Subgraph Matching Protocol for Two PartiesRSA Moduli with a Predetermined Portion: Techniques and ApplicationsEncoding of Rational Numbers and Their Homomorphic Computations for FHE-Based ApplicationsApproximating Eigenvectors with Fixed-Point Arithmetic: A Step Towards Secure Spectral ClusteringOn the Security of Cryptosystems with Quadratic Decryption: The Nicest CryptanalysisA New Randomness Extraction Paradigm for Hybrid EncryptionMinicrypt primitives with algebraic structure and applicationsA Commitment-Consistent Proof of a ShufflePrivacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data HandlingNew RSA-Based (Selectively) Convertible Undeniable Signature SchemesPractical Threshold Signatures with Linear Secret Sharing SchemesCo-sound Zero-Knowledge with Public KeysAnother Look at Extended Private Information Retrieval ProtocolsConstructing Universally Composable Oblivious Transfers from Double Trap-Door EncryptionsPublic Verifiability from Pairings in Secret Sharing SchemesVerifiable shuffles: a formal model and a Paillier-based three-round construction with provable securityEfficiency Limitations for Σ-Protocols for Group HomomorphismsToward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based SignaturesRound-Optimal Blind Signatures from Waters SignaturesThreshold Homomorphic Encryption in the Universally Composable Cryptographic LibraryRound Optimal Universally Composable Oblivious Transfer ProtocolsA Tamper-Evident Voting Machine Resistant to Covert ChannelsSecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient UpdatesOptimally Sound Sigma Protocols Under DCRAFaster Homomorphic Evaluation of Discrete Fourier TransformsA Simpler Rate-Optimal CPIR ProtocolCryptographic Voting — A Gentle IntroductionVD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private DatasetsAugmented Oblivious Polynomial Evaluation Protocol and Its ApplicationsHomomorphic EncryptionHierarchical and dynamic threshold Paillier cryptosystem without trusted dealerLattice-Based SNARGs and Their Application to More Efficient ObfuscationAdaptive PartitioningWeak Zero-Knowledge beyond the Black-Box BarrierSome basics on privacy techniques, anonymization and their big data challengesEfficient set intersection with simulation-based securityInformation security protocol based system identification with binary-valued observationsCounterexamples to new circular security assumptions underlying iOLarge message homomorphic secret sharing from DCR and applicationsSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsTrapdoor DDH groups from pairings and isogeniesSuccinct non-interactive arguments via linear interactive proofsTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelPrivacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir's secret sharing schemePrivacy-preserving inverse distance weighted interpolationWhite-box ECDSA: challenges and existing solutionsGeneric plaintext equality and inequality proofsPractical witness-key-agreement for blockchain-based dark pools financial tradingRegular lossy functions and their applications in leakage-resilient cryptographyReview of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigmVersatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)One-more unforgeability of blind ECDSAAttacks on a privacy-preserving publish-subscribe system and a ride-hailing serviceWhen HEAAN meets FV: a new somewhat homomorphic encryption with reduced memory overheadRate-limited secure function evaluationConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsEncrypted SQL arithmetic functions processing for secure cloud databaseChosen ciphertext secure keyed-homomorphic public-key cryptosystemsAlgebraic secret sharing using privacy homomorphisms for IoT-based healthcare systemsPaillier's trapdoor function hides \(\Theta(n)\) bitsLabeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced dataDynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) securityElectronic jury voting protocolsPrivate computation of polynomials over networksSecure multiparty computation with sublinear preprocessingPractical non-interactive publicly verifiable secret sharing with thousands of partiesSingle-server private information retrieval with sublinear amortized timeOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesA verifiable secret shuffle of homomorphic encryptionsPrivacy and verifiability in voting systems: methods, developments and trendsPaillier-based publicly verifiable (non-interactive) secret sharingSecret computation of purchase history data using somewhat homomorphic encryptionA homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracleSpreading alerts quietly and the subgroup escape problemSmooth projective hashing and two-message oblivious transferGroup homomorphic encryption: characterizations, impossibility results, and applicationsReproducible circularly secure bit encryption: applications and realizationsMore constructions of lossy and correlation-secure trapdoor functionsPrivacy-preserving outsourcing of image feature extraction in cloud computingDiscrete logarithm based additively homomorphic encryption and secure data aggregationEfficient set operations in the presence of malicious adversariesA new construction of the server-aided verification signature schemeDecentralized multi-client functional encryption for inner productPractical fully secure unrestricted inner product functional encryption modulo \(p\)Homomorphic secret sharing for low degree polynomialsZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionShort undeniable signatures based on group homomorphismsOn the tightness of forward-secure signature reductionsLossy trapdoor functions from homomorphic reproducible encryptionAn efficient IND-CCA2 secure Paillier-based cryptosystemPrivacy preserving distributed optimization using homomorphic encryptionRestricted adaptive oblivious transferResource fairness and composability of cryptographic protocolsParallel algorithms for modular multi-exponentiationA characterization of chameleon hash functions and new, efficient designsTrusted computing with addition machines. IISecure multiparty computation of solid geometric problems and their applicationsAll-but-many encryptionTrusted computing with addition machines. IEfficient one-sided adaptively secure computationOblivious polynomial evaluation and secure set-intersection from algebraic PRFsOblivious access control policies for cloud based data sharing systemsOn RSA moduli with half of the bits prescribedOblivious DFA evaluation on joint input and its applicationsA communication-efficient private matching scheme in client-server modelOn the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groupsOn RSA moduli with almost half of the bits prescribedSecurity and privacy aspects in MapReduce on clouds: a surveySemantic security for the McEliece cryptosystem without random oraclesBetter security for deterministic public-key encryption: the auxiliary-input settingComputationally secure pattern matching in the presence of malicious adversariesCandidate iO from homomorphic encryption schemesNew constructions of statistical NIZKs: dual-mode DV-NIZKs and moreBoosting verifiable computation on encrypted dataAggregatable distributed key generationThe rise of Paillier: homomorphic secret sharing and public-key silent OTLPPRS: new location privacy preserving schemes based on ring signature over mobile social networksAn improvement of multi-exponentiation with encrypted bases argument: smaller and fasterHybrid commitments and their applications to zero-knowledge proof systemsNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsMultiparty cardinality testing for threshold private intersectionA geometric approach to homomorphic secret sharingBETA: biometric-enabled threshold authenticationMulti-party threshold private set intersection with sublinear communicationSampled-data-based fault-tolerant consensus control for multi-agent systems: a data privacy preserving schemeFilling the gap between voters and cryptography in e-votingDistributed anonymous data perturbation method for privacy-preserving data miningIncompressible encodingsAlways have a backup plan: fully secure synchronous MPC with asynchronous fallbackPSI-stats: private set intersection protocols supporting secure statistical functionsInfluence maximization in social networks with privacy protectionCECMLP: new cipher-based evaluating collaborative multi-layer perceptron scheme in federated learningBlind polynomial evaluation and data tradingNew Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their ApplicationsEfficient RSA Key Generation and Threshold Paillier in the Two-Party SettingMultiparty Proximity Testing with Dishonest Majority from Equality TestingAn efficient probabilistic public-key cryptosystem over quadratic fields quotientsAnalysis of Gong et al.'s CCA2-secure homomorphic encryptionA reduction of security notions in designated confirmer signaturesCross and Clean: Amortized Garbled Circuits with Constant OverheadUC-secure and Contributory Password-Authenticated Group Key ExchangePublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsA secure scalar product protocol against malicious adversariesThreshold cryptography based on Asmuth-Bloom secret sharingPrêt à voter with Paillier encryptionPrivacy Assurances in Multiple Data-Aggregation TransactionsA Secure Priority Queue; Or: On Secure Datastructures from Multiparty ComputationSecure Statistical Analysis Using RLWE-Based Homomorphic EncryptionEfficient cryptosystems from \(2^k\)-th power residue symbolsPrivacy-preserving anomaly detection in cloud with lightweight homomorphic encryptionSecure \(k\)-skyband computation framework in distributed multi-party databasesSecure parameterized pattern matchingAn efficient approach for secure multi-party computation without authenticated channelCompressible FHE with applications to PIRPrivate set intersection: new generic constructions and feasibility resultsReconciling non-malleability with homomorphic encryptionEncryption-decryption-based consensus control for multi-agent systems: handling actuator faultsPrivacy-preserving Krawtchouk moment feature extraction over encrypted image dataOn the Security of Distributed Multiprime RSAA Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom FunctionCryptographic algorithms for privacy-preserving online applicationsOblivious Transfer from Weakly Random Self-Reducible Public-Key CryptosystemAuthentication in Constrained SettingsA Secure and Efficient Protocol for Electronic Treasury AuctionsA Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third PartiesSimulation-based selective opening security for receivers under chosen-ciphertext attacksA generic construction of tightly secure signatures in the multi-user settingOblivious sampling with applications to two-party \(k\)-means clusteringZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionSecure Naïve Bayesian Classification over Encrypted Data in CloudA Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress)Hiding clinical information in medical images: an enhanced encrypted reversible data hiding algorithm grounded on hierarchical absolute moment block truncation codingEfficient RSA key generation and threshold Paillier in the two-party settingPrivacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attackDifferentially private naive Bayes learning over multiple data sourcesPrivacy-preserving ridge regression on distributed dataOutsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted cloudsSecret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programsHomomorphic extensions of CRT-based secret sharingExpressive query over outsourced encrypted dataSecure rational numbers equivalence test based on threshold cryptosystem with rational numbersSecure multi-label data classification in cloud by additionally homomorphic encryptionHomomorphic public-key cryptosystems and encrypting Boolean circuitsPractical dynamic group signatures without knowledge extractorsAdaptive security of multi-party protocols, revisitedPrivacy-preserving and verifiable protocols for scientific computation outsourcing to the cloudOn Privacy-Preserving Biometric AuthenticationA note on an IND-CCA2 secure paillier-based cryptosystemA secure control mechanism for network environmentsHomomorphically encrypted \(k\)-means on cloud-hosted servers with low client-side loadHypercubes and Private Information RetrievalSecure distributed constraint satisfaction: reaching agreement without revealing private informationQuadratic Error Minimization in a Distributed Environment with Privacy PreservingPrivacy Preserving Protocols for Eigenvector ComputationPC-SyncBB: a privacy preserving collusion secure DCOP algorithmBenaloh’s Dense Probabilistic Encryption RevisitedSecure and privacy preserving consensus for second-order systems based on Paillier encryptionThreshold circuit lower bounds on cryptographic functionsOn RSA moduli with prescribed bit patternsSecurity against covert adversaries: Efficient protocols for realistic adversariesLinearly Homomorphic Encryption from $$\mathsf {DDH}$$Universally Verifiable Multiparty Computation from Threshold Homomorphic CryptosystemsCryptographic Assumptions: A Position PaperOnion ORAM: A Constant Bandwidth Blowup Oblivious RAMA unified approach to deterministic encryption: new constructions and a connection to computational entropyA New Rabin-type Trapdoor Permutation Equivalent to FactoringEfficient Secure Two-Party ExponentiationA compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloudAn efficient privacy-preserving compressive data gathering scheme in WSNsEncrypted data processing with homomorphic re-encryptionA new approach for UC security concurrent deniable authenticationIdentity-Based Group EncryptionLeakage-resilient biometric-based remote user authentication with fuzzy extractorsProtecting data privacy in publicly verifiable delegation of matrix and polynomial functionsThreshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet SecurityBetter Preprocessing for Secure Multiparty ComputationA novel fully homomorphic encryption scheme bsed on LWEA Secure M + 1st Price Auction Protocol Based on Bit Slice CircuitsNetwork-Hiding Communication and Applications to Multi-party ProtocolsQuantum Homomorphic Encryption for Polynomial-Sized CircuitsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsOn Constructing Homomorphic Encryption Schemes from Coding TheoryA Secure and Efficient Proof of Integer in an Interval RangeSelf-correctors for Cryptographic ModulesEncryption Switching ProtocolsPrivacy preserving region optimal algorithms for symmetric and asymmetric DCOPsSolving discrete logarithm problems faster with the aid of pre-computationAn information theoretically secure e-lottery scheme based on symmetric bivariate polynomialsSecurity analysis and improvement of a double-trapdoor encryption schemeA public key cryptosystem based on a subgroup membership problemPublic-key cryptography and invariant theoryOn non-Abelian homomorphic public-key cryptosystemsThe Rabin cryptosystem revisitedNew ways to garble arithmetic circuitsBlack-box reusable NISC with random oraclesSublinear-communication secure multiparty computation does not require FHEAlgebraic restriction codes and their applicationsSimple, fast, efficient, and tightly-secure non-malleable non-interactive timed commitmentsTransparent batchable time-lock puzzles and applications to Byzantine consensusOn-line/off-line DCR-based homomorphic encryption and applicationsOne round threshold ECDSA without roll callZero-knowledge arguments for subverted RSA groupsPrivacy-preserving set-based estimation using partially homomorphic encryptionOn Constructing Pairing-Free Identity-Based EncryptionsA bivariate polynomial-based cryptographic hard problem and its applicationsI want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groupsRate-1 incompressible encryption from standard assumptionsFake information mechanism based privacy-preserving average consensusPrivacy-enhanced and non-interactive linear regression with dropout-resilienceThreshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)Watermarkable public key encryption with efficient extraction under standard assumptionsCumulatively all-lossy-but-one trapdoor functions from standard assumptionsMyOPE: malicious security for oblivious polynomial evaluationNon-interactive secure computation of inner-product from LPN and LWETowards practical topology-hiding computationHomomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomialsSimulation-based bi-selective opening security for public key encryptionFaster Privacy-Preserving Location Proximity Schemes$$\mathsf {HIKE}$$ : Walking the Privacy TrailAn algebraic framework for silent preprocessing with trustless setup and active securityLinear-time 2-party secure merge from additively homomorphic encryptionZero-knowledge succinct non-interactive arguments of knowledge based on sets of polynomialsVector commitments over rings and compressed \(\varSigma \)-protocolsGeneric construction of trace-and-revoke inner product functional encryptionTowards practical homomorphic time-lock puzzles: applicability and verifiabilityNetwork-agnostic security comes (almost) for free in DKG and MPCSecure multiparty computation from threshold encryption based on class groupsPrivacy-preserving and lossless distributed estimation of high-dimensional generalized additive mixed modelsCORK: a privacy-preserving and lossless federated learning scheme for deep neural networkCryptanalysis of a privacy-preserving authentication scheme based on private set intersectionFactoring integers and oracles for elliptic and hyperelliptic curvesToward practical privacy-preserving linear regressionFast large-scale honest-majority MPC for malicious adversariesCandidate iO from homomorphic encryption schemes


Uses Software