Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jesper Buus Nielsen is active.

Publication


Featured researches published by Jesper Buus Nielsen.


Science | 2008

RNA Exosome Depletion Reveals Transcription Upstream of Active Human Promoters

Pascal Preker; Jesper Buus Nielsen; Susanne Kammler; Søren Lykke-Andersen; Marianne S. Christensen; Christophe K. Mapendano; Mikkel H. Schierup; Torben Heick Jensen

Studies have shown that the bulk of eukaryotic genomes is transcribed. Transcriptome maps are frequently updated, but low-abundant transcripts have probably gone unnoticed. To eliminate RNA degradation, we depleted the exonucleolytic RNA exosome from human cells and then subjected the RNA to tiling microarray analysis. This revealed a class of short, polyadenylated and highly unstable RNAs. These promoter upstream transcripts (PROMPTs) are produced ∼0.5 to 2.5 kilobases upstream of active transcription start sites. PROMPT transcription occurs in both sense and antisense directions with respect to the downstream gene. In addition, it requires the presence of the gene promoter and is positively correlated with gene activity. We propose that PROMPT transcription is a common characteristic of RNA polymerase II (RNAPII) transcribed genes with a possible regulatory potential.


financial cryptography | 2009

Secure Multiparty Computation Goes Live

Peter Bogetoft; Dan Lund Christensen; Ivan Damgård; Martin Geisler; Thomas Jakobsen; Mikkel Krøigaard; Janus Dam Nielsen; Jesper Buus Nielsen; Kurt Nielsen; Jakob Pagter; Michael I. Schwartzbach; Tomas Toft

In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used.


international cryptology conference | 2002

Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case

Jesper Buus Nielsen

We show that there exists a natural protocol problem which has a simple solution in the random-oracle (RO) model and which has no solution in the complexity-theoretic (CT) model, namely the problem of constructing a non-interactive communication protocol secure against adaptive adversaries a.k.a. non-interactive non-committing encryption. This separation between the models is due to the so-called programability of the random oracle. We show this by providing a formulation of the RO model in which the oracle is not programmable, and showing that in this model, there does not exist non-interactive non-committing encryption.


international cryptology conference | 2003

Relaxing Chosen-Ciphertext Security

Ran Canetti; Hugo Krawczyk; Jesper Buus Nielsen

Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure “for most practical purposes.”


international cryptology conference | 2012

A New Approach to Practical Active-Secure Two-Party Computation

Jesper Buus Nielsen; Peter Sebastian Nordholt; Claudio Orlandi; Sai Sheshank Burra

We propose a new approach to practical two-party computation secure against an active adversary. All prior practical protocols were based on Yaos garbled circuits. We use an OT-based approach and get efficiency via OT extension in the random oracle model. To get a practical protocol we introduce a number of novel techniques for relating the outputs and inputs of OTs in a larger construction. We also report on an implementation of this approach, that shows that our protocol is more efficient than any previous one: For big enough circuits, we can evaluate more than 20000 Boolean gates per second. As an example, evaluating one oblivious AES encryption


theory and application of cryptographic techniques | 2001

Multiparty Computation from Threshold Homomorphic Encryption

Ronald Cramer; Ivan Damgård; Jesper Buus Nielsen


public key cryptography | 2009

Asynchronous Multiparty Computation: Theory and Implementation

Ivan Damgård; Martin Geisler; Mikkel Krøigaard; Jesper Buus Nielsen

\sim 34000


international cryptology conference | 2003

Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption

Ivan Damgård; Jesper Buus Nielsen


theory of cryptography conference | 2011

Perfectly secure oblivious RAM without random oracles

Ivan Damgård; Sigurd Meldgaard; Jesper Buus Nielsen

gates takes 64i¾?seconds, but when repeating the task 27i¾?times it only takes less than 3i¾?seconds per instance.


international cryptology conference | 2000

Improved Non-committing Encryption Schemes Based on a General Complexity Assumption

Ivan Damgård; Jesper Buus Nielsen

We introduce a new approach to multiparty computation (MPC) basing it on homomorphic threshold crypto-systems. We show that given keys for any sufficiently efficient system of this type, general MPC protocols for n parties can be devised which are secure against an active adversary that corrupts any minority of the parties. The total number of bits broadcast is O(nk|C|), where k is the security parameter and |C| is the size of a (Boolean) circuit computing the function to be securely evaluated. An earlier proposal by Franklin and Haber with the same complexity was only secure for passive adversaries, while all earlier protocols with active security had complexity at least quadratic in n. We give two examples of threshold cryptosystems that can support our construction and lead to the claimed complexities.

Collaboration


Dive into the Jesper Buus Nielsen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daniele Venturi

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge