all InfoSec news
Secure Branching Program Evaluation
Aug. 21, 2022, 12:24 p.m. |
IACR News www.iacr.org
ePrint Report: Secure Branching Program Evaluation
Jonas Janneck, Anas Boudi, Anselme Tueno, Matthew Akram
We address the problem of privately evaluating a branching program on encrypted data. This scenario is a 2-party protocol consisting of a server and a client. The server privately holds a branching program which is a representation of a boolean function using a directed acyclic graph. The client holds a secret input to the branching program. The goal of the computation is to evaluate the client's …
More from www.iacr.org / IACR News
Information-theoretic security with asymmetries
2 days, 10 hours ago |
www.iacr.org
Cryptanalytic Audit of the XHash Sponge Function and its Components
2 days, 10 hours ago |
www.iacr.org
Implementation and Performance Analysis of Homomorphic Signature Schemes
2 days, 10 hours ago |
www.iacr.org
Ipotane: Achieving the Best of All Worlds in Asynchronous BFT
2 days, 10 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Sr. Cloud Security Engineer
@ BLOCKCHAINS | USA - Remote
Network Security (SDWAN: Velocloud) Infrastructure Lead
@ Sopra Steria | Noida, Uttar Pradesh, India
Senior Python Engineer, Cloud Security
@ Darktrace | Cambridge
Senior Security Consultant
@ Nokia | United States
Manager, Threat Operations
@ Ivanti | United States, Remote
Lead Cybersecurity Architect - Threat Modeling | AWS Cloud Security
@ JPMorgan Chase & Co. | Columbus, OH, United States