Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ivan Damgård is active.

Publication


Featured researches published by Ivan Damgård.


international cryptology conference | 1989

A Design Principle for Hash Functions

Ivan Damgård

We show that if there exists a computationally collision free function f from m bits to t bits where m > t, then there exists a computationally collision free function h mapping messages of arbitrary polynomial lengths to t-bit strings.Let n be the length of the message, h can be constructed either such that it can be evaluated in time linear in n using 1 processor, or such that it takes time O(log(n)) using O(n) processors, counting evaluations of f as one step. Finally, for any constant k and large n, a speedup by a factor of k over the first construction is available using k processors.Apart from suggesting a generally sound design principle for hash functions, our results give a unified view of several apparently unrelated constructions of hash functions proposed earlier. It also suggests changes to other proposed constructions to make a proof of security potentially easier.We give three concrete examples of constructions, based on modular squaring, on Wolframs pseudoranddom bit generator [Wo], and on the knapsack problem.


international cryptology conference | 1994

Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols

Ronald Cramer; Ivan Damgård; Berry Schoenmakers

Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S on n participants. Then under certain assumptions on P and S, we show how to transform P into a witness indistinguishable protocol, in which the prover demonstrates knowledge of the solution to some subset of n problem instances out of a collection of subsets denned by S. For example, using a threshold scheme, the prover can show that he knows at least d out of n solutions without revealing which d instances are involved. If the instances axe independently generated, we get a witness hiding protocol, even if P did not have this property. Our results can be used to efficiently implement general forms of group oriented identification and signatures. Our transformation produces a protocol with the same number of rounds as P and communication complexity n times that of P. Our results use no unproven complexity assumptions.


international cryptology conference | 2012

Multiparty Computation from Somewhat Homomorphic Encryption

Ivan Damgård; Valerio Pastro; Nigel P. Smart; Sarah Zakarias

We propose a general multiparty computation protocol secure against an active adversary corrupting up to


financial cryptography | 2009

Secure Multiparty Computation Goes Live

Peter Bogetoft; Dan Lund Christensen; Ivan Damgård; Martin Geisler; Thomas Jakobsen; Mikkel Krøigaard; Janus Dam Nielsen; Jesper Buus Nielsen; Kurt Nielsen; Jakob Pagter; Michael I. Schwartzbach; Tomas Toft


public key cryptography | 2001

A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System

Ivan Damgård; Mads Jurik

n-1


theory and application of cryptographic techniques | 1987

Collision free hash functions and public key signature schemes

Ivan Damgård


theory and application of cryptographic techniques | 2000

Efficient concurrent zero-knowledge in the auxiliary string model

Ivan Damgård

of the n players. The protocol may be used to compute securely arithmetic circuits over any finite field


international cryptology conference | 1991

Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks

Ivan Damgård


international cryptology conference | 1990

Convertible Undeniable Signatures

Joan Boyar; David Chaum; Ivan Damgård; Torben Pryds Pedersen

\mathbb {F}_{p^k}


theory and application of cryptographic techniques | 2001

Multiparty Computation from Threshold Homomorphic Encryption

Ronald Cramer; Ivan Damgård; Jesper Buus Nielsen

Collaboration


Dive into the Ivan Damgård's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Louis Salvail

Université de Montréal

View shared research outputs
Top Co-Authors

Avatar

Yuval Ishai

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge