1

2DT-GLS: Faster and Exception-Free Scalar Multiplication in the GLS254 Binary Curve

We revisit and improve performance of arithmetic in the binary GLS254 curve by introducing the 2DT-GLS scalar multiplication algorithm. The algorithm includes theoretical and practice-oriented contributions of potential independent interest: (i) for …

Count Me In! Extendability for Threshold Ring Signatures

Ring signatures enable a signer to sign a message on behalf of a group anonymously, without revealing her identity. Similarly, threshold ring signatures allow several signers to sign the same message on behalf of a group; while the combined signature …

ECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines

We advance the state-of-the art for zero-knowledge commit-and-prove SNARKs (CP-SNARKs). CP-SNARKs are an important class of SNARKs which, using commitments as “glue”, allow to efficiently combine proof systems—e.g., general-purpose SNARKs (an …

Formal Model In-The-Loop for Secure Industrial Control Networks

Current trends of digitalization are becoming significantly prevalent within the field of industrial control systems. While in recent history a typical industrial control system would have been isolated with rudimentary ways of extracting data, …

Homomorphic evaluation of large look-up tables for inference on human genome data in the cloud

iDash is an annual competition for creating new solutions to tackle the challenges of securing human genome processing in untrusted environments, such as the public cloud. In this work, we propose and analyze a simple but efficient candidate for the …

Laconic Private Set-Intersection From Pairings

Private set-intersection (PSI) is one of the most practically relevant special-purpose secure multiparty computation tasks, as it is motivated by many real-world applications. In this paper we present a new private set-intersection protocol which is …

The State of the Union: Union-Only Signatures for Data Aggregation

A union-only signature (UOS) scheme (informally introduced by Johnson et al. at CT-RSA 2002) allows signers to sign sets of messages in such a way that (1) any third party can merge two signatures to derive a signature on the union of the message …

A Differentially Private Hybrid Approach to Traffic Monitoring

In recent years, privacy research has been gaining ground in vehicular communication technologies. Collecting data from connected vehicles presents a range of opportunities for industry and government to perform data analytics. Although many …

Faster Homomorphic Encryption over GPGPUs via Hierarchical DGT

Privacy guarantees are still insufficient for outsourced data processing in the cloud. While employing encryption is feasible for data at rest or in transit, it is not for computation without remarkable performance slowdown. Thus, handling data in …

Formally Verified Credentials Management for Industrial Control Systems

The field of industrial automation is experiencing growth in interconnectivity and digital interaction. This growth is slower than in a consumer segment due to often critical nature of industrial control systems. Security of such systems is an …