Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Enrique Larraia is active.

Publication


Featured researches published by Enrique Larraia.


european symposium on research in computer security | 2013

Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits

Ivan Damgård; Marcel Keller; Enrique Larraia; Valerio Pastro; Peter Scholl; Nigel P. Smart

SPDZ (pronounced “Speedz”) is the nickname of the MPC protocol of Damgard et al. from Crypto 2012. In this paper we both resolve a number of open problems with SPDZ; and present several theoretical and practical improvements to the protocol. In detail, we start by designing and implementing a covertly secure key generation protocol for obtaining a BGV public key and a shared associated secret key. We then construct both a covertly and actively secure preprocessing phase, both of which compare favourably with previous work in terms of efficiency and provable security.


international cryptology conference | 2014

Dishonest Majority Multi-Party Computation for Binary Circuits

Enrique Larraia; Emmanuela Orsini; Nigel P. Smart

We extend the Tiny-OT two party protocol of Nielsen et al (CRYPTO 2012) to the case of n parties in the dishonest majority setting. This is done by presenting a novel way of transferring pairwise authentications into global authentications. As a by product we obtain a more efficient manner of producing globally authenticated shares, in the random oracle model, which in turn leads to a more efficient two party protocol than that of Nielsen et al.


security and cryptography for networks | 2012

Implementing AES via an actively/covertly secure dishonest-majority MPC protocol

Ivan Damgård; Marcel Keller; Enrique Larraia; Christian Miles; Nigel P. Smart

We describe an implementation of the protocol of Damgard, Pastro, Smart and Zakarias (SPDZ/Speedz) for multi-party computation in the presence of a dishonest majority of active adversaries. We present a number of modifications to the protocol; the first reduces the security to covert security, but produces significant performance enhancements; the second enables us to perform bit-wise operations in characteristic two fields. As a bench mark application we present the evaluation of the AES cipher, a now standard bench marking example for multi-party computation. We need examine two different implementation techniques, which are distinct from prior MPC work in this area due to the use of MACs within the SPDZ protocol. We then examine two implementation choices for the finite fields; one based on finite fields of size 28 and one based on embedding the AES field into a larger finite field of size 240.


theory of cryptography conference | 2016

Multilinear Maps from Obfuscation

Martin R. Albrecht; Pooya Farshim; Dennis Hofheinz; Enrique Larraia; Kenneth G. Paterson

We provide constructions of multilinear groups equipped with natural hard problems from indistinguishability obfuscation, homomorphic encryption, and NIZKs. This complements known results on the constructions of indistinguishability obfuscators from multilinear maps in the reverse direction. n nWe provide two distinct, but closely related constructions and show that multilinear analogues of the


IMA International Conference on Cryptography and Coding | 2017

Notes on GGH13 Without the Presence of Ideals

Martin R. Albrecht; Alex Davidson; Enrique Larraia


International Conference on Cryptology and Information Security in Latin America | 2014

Extending Oblivious Transfer Efficiently

Enrique Larraia

mathrm {DDH}


public key cryptography | 2018

Graded Encoding Schemes from Obfuscation

Pooya Farshim; Julia Hesse; Dennis Hofheinz; Enrique Larraia


IACR Cryptology ePrint Archive | 2015

High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer.

Sai Sheshank Burra; Enrique Larraia; Jesper Buus Nielsen; Peter Sebastian Nordholt; Claudio Orlandi; Emmanuela Orsini; Peter Scholl; Nigel P. Smart

assumption hold for them. Our first construction is symmetric and comes with a


international conference on progress in cryptology | 2014

Extending Oblivious Transfer Efficiently - or - How to Get Active Security with Constant Cryptographic Overhead.

Enrique Larraia


IACR Cryptology ePrint Archive | 2015

Multilinear Maps from Obfuscation.

Martin R. Albrecht; Pooya Farshim; Dennis Hofheinz; Enrique Larraia; Kenneth G. Paterson

kappa

Collaboration


Dive into the Enrique Larraia's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dennis Hofheinz

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge