Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Valerio Pastro is active.

Publication


Featured researches published by Valerio Pastro.


international cryptology conference | 2012

Multiparty Computation from Somewhat Homomorphic Encryption

Ivan Damgård; Valerio Pastro; Nigel P. Smart; Sarah Zakarias

We propose a general multiparty computation protocol secure against an active adversary corrupting up to


european symposium on research in computer security | 2013

Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits

Ivan Damgård; Marcel Keller; Enrique Larraia; Valerio Pastro; Peter Scholl; Nigel P. Smart


computer and communications security | 2014

Efficiently Verifiable Computation on Encrypted Data

Dario Fiore; Rosario Gennaro; Valerio Pastro

n-1


international conference on information theoretic security | 2012

On the amortized complexity of zero knowledge protocols for multiplicative relations

Ronald Cramer; Ivan Damgård; Valerio Pastro


public key cryptography | 2016

Robust Secret Sharing Schemes Against Local Adversaries

Allison Bishop; Valerio Pastro

of the n players. The protocol may be used to compute securely arithmetic circuits over any finite field


international cryptology conference | 2016

Essentially Optimal Robust Secret Sharing with Maximal Corruptions

Allison Bishop; Valerio Pastro; Rajmohan Rajaraman; Daniel Wichs


IACR Cryptology ePrint Archive | 2014

Verifiable Computation over Encrypted Data in the Presence of Verification Queries.

Rosario Gennaro; Valerio Pastro

\mathbb {F}_{p^k}


IACR Cryptology ePrint Archive | 2017

Private Data Aggregation on a Budget.

Morten Dahl; Valerio Pastro; Mathieu Poumeyrol


Springer US | 2013

Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits

Ivan Damgård; Marcel Keller; Enrique Larraia; Valerio Pastro; Peter Scholl; Nigel P. Smart

. Our protocol consists of a preprocessing phase that is both independent of the function to be computed and of the inputs, and a much more efficient online phase where the actual computation takes place. The online phase is unconditionally secure and has total computational and communication complexity linear in n, the number of players, where earlier work was quadratic in n. Moreover, the work done by each player is only a small constant factor larger than what one would need to compute the circuit in the clear. We show this is optimal for computation in large fields. In practice, for 3 players, a secure 64-bit multiplication can be done in 0.05 ms. Our preprocessing is based on a somewhat homomorphic cryptosystem. We extend a scheme by Brakerski et al., so that we can perform distributed decryption and handle many values in parallel in one ciphertext. The computational complexity of our preprocessing phase is dominated by the public-key operations, we need


IACR Cryptology ePrint Archive | 2018

A Simple Obfuscation Scheme for Pattern-Matching with Wildcards.

Allison Bishop; Lucas Kowalczyk; Tal Malkin; Valerio Pastro; Mariana Raykova; Kevin Shi

Collaboration


Dive into the Valerio Pastro's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge