Ivan Bjerre Damgård

  • Åbogade 34, 5335, 277

    8200 Aarhus N

    Denmark

1987 …2024

Research activity per year

Search results

  • 2024

    An Improved Threshold Homomorphic Cryptosystem Based on Class Groups

    Braun, L., Castagnos, G., Damgård, I. B., Laguillaumie, F., Melissaris, K., Orlandi, C. & Tucker, I., 2024, (Accepted/In press).

    Research output: Working paper/Preprint Preprint

  • Differentially Private Selection from Secure Distributed Computing

    Damgård, I., Keller, H., Nelson, B., Orlandi, C. & Pagh, R., May 2024, WWW 2024 - Proceedings of the ACM Web Conference. New York: Association for Computing Machinery, p. 1103-1114 12 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity

    Yakoubov, S., Damgård, I. B., Tschudi, D., Roy, L. D. & Ravi, D., 2024, Theory of Cryptography.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • 2023

    Broadcast-Optimal Four-Round MPC in the Plain Model

    Ciampi, M., Damgård, I., Ravi, D., Siniscalchi, L., Xia, Y. & Yakoubov, S., Nov 2023, Theory of Cryptography: 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 – December 2, 2023, Proceedings, Part II. Rothblum, G. & Wee, H. (eds.). Springer, p. 3-32 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 14370 ).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels

    Damgård, I., Ravi, D., Siniscalchi, L. & Yakoubov, S., Sept 2023, Progress in Cryptology – LATINCRYPT 2023: 8th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2023, Quito, Ecuador, October 3–6, 2023, Proceedings. Aly, A. & Tibouchi, M. (eds.). Cham: Springer, p. 87-106 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 14168).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • Improved Distributed RSA Key Generation Using the Miller-Rabin Test

    Burkhardt, J., Damgård, I., Frederiksen, T. K., Orlandi, C. & Ghosh, S., Nov 2023, CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Meng, W., Jensen, C. D., Cremers, C. & Kirda, E. (eds.). New York: Association for Computing Machinery, p. 2501-2515 15 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    3 Citations (Scopus)
  • Minimizing Setup in Broadcast-Optimal Two Round MPC

    Damgård, I., Ravi, D., Siniscalchi, L. & Yakoubov, S., Apr 2023, Advances in Cryptology – EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23–27, 2023, Proceedings, Part II. Hazay, C. & Stam, M. (eds.). Cham: Springer, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 14005).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    2 Citations (Scopus)
  • Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks

    Damgård, I., Escudero, D. & Polychroniadou, A., Jul 2023, 4th Conference on Information-Theoretic Cryptography, ITC 2023. Chung, K.-M. (ed.). Dagstuhl Publishing, p. 7:1--7:21 7. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 267).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • Secure Communication in Dynamic Incomplete Networks

    Damgård, I., Ravi, D., Tschudi, D. & Yakoubov, S., Jul 2023, 4th Conference on Information-Theoretic Cryptography, ITC 2023. Chung, K.-M. (ed.). Dagstuhl Publishing, p. 13:1--13:21 13. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 267).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • Secure Multiparty Computation from Threshold Encryption Based on Class Groups

    Braun, L., Damgård, I. B. & Orlandi, C., Aug 2023, Advances in Cryptology: CRYPTO 2023. Handschuh, H. & Lysyanskaya, A. (eds.). Cham: Springer, p. 613-645 33 p. (Lecture Notes in Computer Science, Vol. 14081).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
    5 Citations (Scopus)
  • System Security Mechanisms / Attacks and Pitfalls in Cryptography

    Aranha, D. F., Damgård, I. B., Nielsen, J. B. & Orlandi, C., Oct 2023, (Unpublished) Secure Distributed Systems: An Introduction to Cryptography, IT-Security, Distributed Systems, and Blockchain Technology.

    Research output: Contribution to book/anthology/report/proceedingBook chapterEducation

  • 2022

    An Algebraic Framework for Silent Preprocessing with Trustless Setup and Active Security

    Abram, D., Damgård, I., Orlandi, C. & Scholl, P., 2022, Advances in Cryptology – CRYPTO 2022. Dodis, Y. & Shrimpton, T. (eds.). Cham: Springer, p. 421-452 32 p. (Lecture Notes in Computer Science, Vol. 13510).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearch

    6 Citations (Scopus)
  • Fast threshold ECDSA with honest majority

    Damgård, I., Jakobsen, T. P., Nielsen, J. B., Pagter, J. I. & Østergaard, M. B., Jan 2022, In: Journal of Computer Security. 30, 1, p. 167-196 30 p.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

    8 Citations (Scopus)
  • On Access Control Encryption Without Sanitization

    Boschini, C., Damgård, I. & Orlandi, C., 2022, Security and Cryptography for Networks. SCN 2022. Galdi, C. & Jarecki, S. (eds.). Cham: Springer, p. 220-243 24 p. (Lecture Notes in Computer Science, Vol. 13409).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    2 Citations (Scopus)
  • Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices

    Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M., Apr 2022, In: Journal of Cryptology. 35, 2, 56 p., 14.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

    Open Access
    19 Citations (Scopus)
  • Vector Commitments over Rings and Compressed Σ -Protocols

    Attema, T., Cascudo, I., Cramer, R., Damgård, I. & Escudero, D., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer, Vol. Part 1. p. 173-202 30 p. (Lecture Notes in Computer Science, Vol. 13747).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    2 Citations (Scopus)
  • 2021

    Balancing Privacy and Accountability in Blockchain Identity Management

    Damgård, I., Ganesh, C., Khoshakhlagh, H., Orlandi, C. & Siniscalchi, L., 2021, Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings. Paterson, K. G. (ed.). Springer, p. 552-576 25 p. (Lecture Notes in Computer Science, Vol. 12704).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    18 Citations (Scopus)
  • Broadcast-Optimal Two Round MPC with an Honest Majority

    Damgård, I. B., Magri, B., Ravi, D., Siniscalchi, L. & Yakoubov, S., 2021, Advances in Cryptology – CRYPTO 2021: Proceedings. Springer, p. 155-184 30 p.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    4 Citations (Scopus)
  • Broadcast secret-sharing, bounds and applications

    Damgård, I. B., Larsen, K. G. & Yakoubov, S., Jul 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Dagstuhl Publishing, 20 p. 10. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 199).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
  • Information-Theoretically Secure MPC Against Mixed Dynamic Adversaries

    Damgård, I., Escudero, D. & Ravi, D., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Springer, p. 591-622 32 p. (Lecture Notes in Computer Science, Vol. 13042).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  • More communication lower bounds for information-theoretic MPC

    Damgård, I. B., Li, B. & Schwartzbach, N. I., Jul 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Dagstuhl Publishing, 18 p. 2. (Leibniz International Proceedings in Informatics, LIPIcs, Vol. 199).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
    1 Citation (Scopus)
  • Oblivious TLS via Multi-party Computation

    Abram, D., Damgård, I., Scholl, P. & Trieflinger, S., 2021, Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings. Paterson, K. G. (ed.). Springer, p. 51-74 24 p. (Lecture Notes in Computer Science, Vol. 12704).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    1 Citation (Scopus)
  • Two-round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices

    Damgård, I. B., Orlandi, C., Takahashi, A. & Tibouchi, M., May 2021, Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings: 24rd IACR International Conference on Practice and Theory of Public-Key Cryptography, proceedings part 1. Garay, J. A. (ed.). Cham: Springer, p. 99-130 32 p. (Lecture Notes in Computer Science, Vol. 12710).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
    22 Citations (Scopus)
  • 2020

    Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/pkZ

    Abspoel, M., Cramer, R., Damgård, I., Escudero, D., Rambaud, M., Xing, C. & Yuan, C., 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). Cham: Springer, Vol. III. p. 151-180 30 p. (Lecture Notes in Computer Science, Vol. 12493).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    4 Citations (Scopus)
  • Black-box transformations from passive to covert security with public verifiability

    Damgård, I., Orlandi, C. & Simkin, M., 2020, Advances in Cryptology - CRYPTO 2020. Micciancio, D. & Ristenpart, T. (eds.). Springer, Vol. Cham. p. 647-676 30 p. (Lecture Notes in Computer Science, Vol. 12171).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    7 Citations (Scopus)
  • Fast threshold ECDSA with honest majority

    Damgård, I., Jakobsen, T. P., Nielsen, J. B., Pagter, J. I. & Østergaard, M. B., 2020, Security and Cryptography for Networks. Galdi, C. & Kolesnikov, V. (eds.). Cham: Springer, p. 382-400 19 p. (Lecture Notes in Computer Science, Vol. 12238).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    15 Citations (Scopus)
  • Stronger Security and Constructions of Multi-designated Verifier Signatures

    Damgård, I., Haagh, H., Mercer, R., Nitulescu, A., Orlandi, C. & Yakoubov, S., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings: Proceedings. Pass, R. & Pietrzak, K. (eds.). Cham: Springer, Vol. II. p. 229-260 32 p. (Lecture Notes in Computer Science, Vol. 12551).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    6 Citations (Scopus)
  • 2019

    Commodity-Based 2PC for Arithmetic Circuits

    Damgård, I. B., Haagh, H., Nielsen, M. & Orlandi, C., 2019, Cryptology ePrint Archive.

    Research output: Other contributionNet publication - Internet publicationResearch

  • Commodity-Based 2PC for Arithmetic Circuits

    Damgård, I., Haagh, H., Nielsen, M. & Orlandi, C., 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 154-177 24 p. (Lecture Notes in Computer Science, Vol. 11929).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    Open Access
    5 Citations (Scopus)
  • Communication Lower Bounds for Statistically Secure MPC, With or Without Preprocessing

    Damgård, I., Larsen, K. G. & Nielsen, J. B., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Springer, Vol. II. p. 61-84 24 p. (Lecture Notes in Computer Science, Vol. 11693).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    8 Citations (Scopus)
  • Efficient Information-Theoretic Secure Multiparty Computation over Z/p^k Z via Galois Rings

    Abspoel, M., Cramer, R., Damgård, I. B., Escudero Ospina, D. E. & Yuan, C., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings: Proceedings. Hofheinz, D. & Rosen, A. (eds.). Cham: Springer, Vol. Part 1. p. 471-501 11 p. (Lecture Notes in Computer Science, Vol. 11891).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    File
    18 Citations (Scopus)
    140 Downloads (Pure)
  • Efficient UC Commitment Extension with Homomorphism for Free (and Applications)

    Cascudo, I., Damgård, I., David, B., Döttling, N., Dowsley, R. & Giacomelli, I., 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 606-635 30 p. (Lecture Notes in Computer Science, Vol. 11922).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    5 Citations (Scopus)
  • New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning

    Damgård, I. B., Escudero Ospina, D. E., Frederiksen, T. K., Keller, M., Scholl, P. & Volgushev, N., 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. IEEE, p. 1102-1120 19 p. 8835310

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    86 Citations (Scopus)
  • Proofs of Replicated Storage Without Timing Assumptions

    Damgård, I. B., Ganesh, C. & Orlandi, C., Aug 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Springer, p. 355-380 25 p. (Lecture Notes in Computer Science, Vol. 11692).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    19 Citations (Scopus)
  • Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures

    Aggarwal, D., Damgård, I., Nielsen, J. B., Obremski, M., Purwanto, E., Ribeiro, J. & Simkin, M., 2019, Advances in Cryptology – CRYPTO 2019 : 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Cham: Springer, Vol. II. p. 510-539 30 p. (Lecture Notes in Computer Science, Vol. 11693).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    25 Citations (Scopus)
  • 2018

    Compact Zero-Knowledge Proofs of Small Hamming Weight

    Damgård, I., Luo, J., Oechsner, S., Scholl, P. & Simkin, M., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Cham: Springer VS, Vol. 10770. p. 530-560 31 p. (Lecture Notes in Computer Science (LNCS); No. 10770).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    5 Citations (Scopus)
  • Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments

    Damgård, I., Kazana, T., Obremski, M., Raj, V. & Siniscalchi, L., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Cham: Springer VS, Vol. 11240. p. 225-254 30 p. (Lecture Notes in Computer Science (LNCS); No. 11240).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    3 Citations (Scopus)
  • More Efficient Commitments from Structured Lattice Assumptions

    Baum, C., Damgård, I., Lyubashevsky, V., Oechsner, S. & Peikert, C., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Cham: Springer VS, Vol. 11035. p. 368-385 18 p. (Lecture Notes in Computer Science (LNCS); No. 11035).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    80 Citations (Scopus)
  • SPDΖ2k: Efficient MPC mod 2k for Dishonest Majority

    Cramer, R., Damgård, I., Escudero, D., Scholl, P. & Xing, C., 2018, Advances in Cryptology - CRYPTO 2018. Shacham, H. & Boldyreva, A. (eds.). Cham: Springer VS, Vol. 10992. p. 769-798 30 p. (Lecture Notes in Computer Science (LNCS); No. 10992).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    79 Citations (Scopus)
  • Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings

    Damgård, I., Orlandi, C. & Simkin, M., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Cham: Springer VS, Vol. 10992. p. 799-829 31 p. (Lecture Notes in Computer Science (LNCS); No. 10992).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    20 Citations (Scopus)
  • 2017

    Amortized complexity of zero-knowledge proofs revisited: Achieving linear soundness slack

    Cramer, R., Damgård, I., Xing, C. & Yuan, C., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J.-S. & Buus Nielsen, J. (eds.). Springer VS, Vol. 10210. p. 479-500 22 p. (Lecture Notes in Computer Science, Vol. 10210).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    13 Citations (Scopus)
  • Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier

    Damgård, I., Faust, S., Mukherjee, P. & Venturi, D., Jan 2017, In: Journal of Cryptology. 30, 1, p. 152-190 39 p.

    Research output: Contribution to journal/Conference contribution in journal/Contribution to newspaperJournal articleResearchpeer-review

    6 Citations (Scopus)
  • Confidential benchmarking based on multiparty computation

    Damgård, I., Damgård, K., Nielsen, K., Nordholt, P. S. & Toft, T., 2017, Financial Cryptography and Data Security - 20th International Conference, FC 2016, Revised Selected Papers. Grossklags, J. & Preneel, B. (eds.). Springer VS, Vol. 9603 LNCS. p. 169-187 19 p. (Lecture Notes in Computer Science, Vol. 9603).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    31 Citations (Scopus)
  • Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model

    Cramer, R., Damgård, I., Döttling, N., Giacomelli, I. & Xing, C., 2017, Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings. Shikata, J. (ed.). Springer VS, Vol. 10681. p. 1-25 25 p. (Lecture Notes in Computer Science, Vol. 10681).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    1 Citation (Scopus)
  • Resource-Efficient OT Combiners with Active Security

    Cascudo, I., Damgård, I., Farràs, O. & Ranellucci, S., 1 Jan 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer VS, Vol. 10678. p. 461-486 26 p. (Lecture Notes in Computer Science, Vol. 10678).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    2 Citations (Scopus)
  • Secure Arithmetic Computation with Constant Computational Overhead

    Applebaum, B., Damgård, I., Ishai, Y., Nielsen, M. & Zichron, L., 1 Jan 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Shacham, H. & Katz, J. (eds.). Springer VS, Vol. 10401. p. 223-254 32 p. (Lecture Notes in Computer Science, Vol. 10401).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    42 Citations (Scopus)
  • The tinytable protocol for 2-party secure computation, or: Gate-scrambling revisited

    Damgård, I., Nielsen, J. B., Nielsen, M. & Ranellucci, S., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Springer VS, Vol. 10401. p. 167-187 21 p. (Lecture Notes in Computer Science, Vol. 10401).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    40 Citations (Scopus)
  • 2016

    Access Control Encryption: Enforcing Information Flow with Cryptography

    Damgård, I. B., Haagh, H. F. & Orlandi, C., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Hirt, M. & Smith, A. (eds.). Springer VS, Vol. 9986. p. 547-576 29 p. (Lecture Notes in Computer Science, Vol. 9986).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    73 Citations (Scopus)
  • Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)

    Damgård, I. B., Polychroniadou, A. & Rao, V., 2016, Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Springer VS, Vol. 9615 . p. 208-233 26 p. (Lecture Notes in Computer Science, Vol. 9615).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    11 Citations (Scopus)
  • Better Preprocessing for Secure Multiparty Computation

    Baum, C., Damgård, I. B., Toft, T. & Zakarias, R. W., 2016, Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings: 14th International Conference on Applied Cryptography and Network Security. Manulis, M., Sadeghi, A.-R. & Schneider , S. (eds.). Springer VS, Vol. 9696. p. 327-345 19 p. (Lecture Notes in Computer Science (LNCS), Vol. 9696).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

    18 Citations (Scopus)