Skip to main content

Showing 1–2 of 2 results for author: Haagh, H

Searching in archive cs. Search in all archives.
.
  1. Computer-aided proofs for multiparty computation with active security

    Authors: Helene Haagh, Aleksandr Karbyshev, Sabine Oechsner, Bas Spitters, Pierre-Yves Strub

    Abstract: Secure multi-party computation (MPC) is a general cryptographic technique that allows distrusting parties to compute a function of their individual inputs, while only revealing the output of the function. It has found applications in areas such as auctioning, email filtering, and secure teleconference. Given its importance, it is crucial that the protocols are specified and implemented correctly.… ▽ More

    Submitted 19 June, 2018; originally announced June 2018.

    Journal ref: Computer Security Foundations (CSF) 2018

  2. arXiv:1602.03642  [pdf, ps, other

    cs.CR

    Access Control Encryption: Enforcing Information Flow with Cryptography

    Authors: Ivan Damgård, Helene Haagh, Claudio Orlandi

    Abstract: We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users not only in terms of which messages they are allowed to receive, but also which messages they are allowed to send. Classical examples of security policies for information flow are the well known Bell-Lapadula [BL73] or Bi… ▽ More

    Submitted 2 December, 2016; v1 submitted 11 February, 2016; originally announced February 2016.