Valerio Pastro
Aarhus University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Valerio Pastro.
international cryptology conference | 2012
Ivan Damgård; Valerio Pastro; Nigel P. Smart; Sarah Zakarias
We propose a general multiparty computation protocol secure against an active adversary corrupting up to
european symposium on research in computer security | 2013
Ivan Damgård; Marcel Keller; Enrique Larraia; Valerio Pastro; Peter Scholl; Nigel P. Smart
computer and communications security | 2014
Dario Fiore; Rosario Gennaro; Valerio Pastro
n-1
international conference on information theoretic security | 2012
Ronald Cramer; Ivan Damgård; Valerio Pastro
public key cryptography | 2016
Allison Bishop; Valerio Pastro
of the n players. The protocol may be used to compute securely arithmetic circuits over any finite field
international cryptology conference | 2016
Allison Bishop; Valerio Pastro; Rajmohan Rajaraman; Daniel Wichs
IACR Cryptology ePrint Archive | 2014
Rosario Gennaro; Valerio Pastro
\mathbb {F}_{p^k}
IACR Cryptology ePrint Archive | 2017
Morten Dahl; Valerio Pastro; Mathieu Poumeyrol
Springer US | 2013
Ivan Damgård; Marcel Keller; Enrique Larraia; Valerio Pastro; Peter Scholl; Nigel P. Smart
. Our protocol consists of a preprocessing phase that is both independent of the function to be computed and of the inputs, and a much more efficient online phase where the actual computation takes place. The online phase is unconditionally secure and has total computational and communication complexity linear in n, the number of players, where earlier work was quadratic in n. Moreover, the work done by each player is only a small constant factor larger than what one would need to compute the circuit in the clear. We show this is optimal for computation in large fields. In practice, for 3 players, a secure 64-bit multiplication can be done in 0.05 ms. Our preprocessing is based on a somewhat homomorphic cryptosystem. We extend a scheme by Brakerski et al., so that we can perform distributed decryption and handle many values in parallel in one ciphertext. The computational complexity of our preprocessing phase is dominated by the public-key operations, we need
IACR Cryptology ePrint Archive | 2018
Allison Bishop; Lucas Kowalczyk; Tal Malkin; Valerio Pastro; Mariana Raykova; Kevin Shi