International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
The SPEKE Protocol Revisited
Feng Hao Siamak F. Shahandashti
The SPEKE protocol is commonly considered one of the classic Password Authenticated Key Exchange (PAKE) schemes. It has been included in international standards (particularly, ISO/IEC 11770-4 and IEEE 1363.2) and deployed in...
last revised 25 Sep 2014
Siamak Fayyaz Shahandashti
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
Feng Hao Xun Yi Liqun Chen Siamak F. Shahandashti
In this paper, we study Password Authenticated Key Exchange (PAKE) in a group. First, we present a generic ``fairy-ring dance'' construction that transforms any secure two-party PAKE scheme to a group PAKE protocol while...
last revised 11 Feb 2015
Towards Bitcoin Payment Networks
Patrick McCorry Malte M\"oser Siamak F. Shahandashti Feng Hao
Bitcoin as deployed today does not scale. Scalability research has focused on two directions: 1) redesigning the Blockchain protocol, and 2) facilitating `off-chain transactions' and only consulting the Blockchain if an...
last revised 26 Apr 2016
Refund attacks on Bitcoin’s Payment Protocol
Patrick McCorry Siamak F. Shahandashti Feng Hao
BIP70 is a community-accepted Payment Protocol standard that governs how merchants and customers perform payments in Bitcoin. This standard is supported by most major wallets and the two dominant Payment Processors: Coinbase...
last revised 12 Jan 2016
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures
Siamak Fayyaz Shahandashti Reihaneh Safavi-Naini
Pkc 2008
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
Patrick McCorry Siamak F. Shahandashti Feng Hao
We present the first implementation of a decentralised and self-tallying internet voting protocol with maximum voter privacy using the Blockchain. The Open Vote Network is suitable for boardroom elec- tions and is written as a...
received 10 Feb 2017
Verifiable Classroom Voting in Practice
Feng Hao Dylan Clarke Brian Randell Siamak F. Shahandashti
Classroom voting is an important pedagogical technique in which students learn by voting on the answers to questions. The same voting platform is also often used for exercises such as rating lecturer performance and voting for...
last revised 23 Jun 2017
J-PAKE: Authenticated Key Exchange Without PKI
Feng Hao Peter Ryan
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a...
last revised 25 Oct 2010
On the Security of the SPEKE Password-Authenticated Key Exchange Protocol
Philip MacKenzie
In the most strict formal definition of security for password-authenticated key exchange, an adversary can test at most one password per impersonation attempt. We propose a slightly relaxed definition which restricts an...
received 19 Jul 2001
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities
Siamak F. Shahandashti Feng Hao
Nearly all verifiable e-voting schemes require trustworthy authorities to perform the tallying operations. An exception is the DRE-i system which removes this requirement by pre-computing all encrypted ballots before the...
last revised 11 Jul 2016
IACR Public Key Cryptography, PKC 2008
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project PKC 2008: Barcelona, Spain Ronald Cramer (Ed.): Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and...
Feng-Hao Liu
Florida Atlantic University, USA
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware
Dana Dachman-Soled Feng-Hao Liu Hong-Sheng Zhou
Eurocrypt 2015
External Reviewers, IACR ASIACRYPT 2010
External Reviewers, IACR ASIACRYPT 2010 Michel Abdalla Johan Aberg Shweta Agarwal Martin Agren Hadi Ahmadi Amy Alford Joel Alwen Elena Andreeva Frederik Armknecht Nuttapong Attrapadung Man Ho Au Paul Baecher Joonsang Baek Kfir...
Feng Hao
Newcastle University, UK
Authenticated Key Exchange over Bitcoin
Patrick McCorry Siamak F. Shahandashti Dylan Clarke Feng Hao
Bitcoin is designed to protect user anonymity (or pseudonymity) in a financial transaction, and has been increasingly adopted by major e- commerce websites such as Dell, PayPal and Expedia. While the anonymity of Bitcoin...
last revised 25 Sep 2015
Private Fingerprint Matching
Siamak F. Shahandashti Reihaneh Safavi-Naini Philip Ogunbona
We propose a fully private fingerprint matching protocol that compares two fingerprints based on the most widely-used minutia-based fingerprint matching algorithm. The protocol enables two parties, each holding a private...
received 21 Apr 2012
IACR ASIACRYPT 2008, External Reviewers
IACR ASIACRYPT 2008, External Reviewers Michel Abdalla Hadi Ahmadi Kennichiro Akai Jesus Almansa Elena Andreeva Kazumaro Aoki François Arnault Mina Askari Mandal Avradip Joonsang Baek Endre Bangerter Gregory Bard Rana Barua...
Theoretical Attacks on E2E Voting Systems
Peter Hyun-Jeen Lee Siamak F. Shahandashti
We give a survey of existing attacks against end-to-end verifiable voting systems in the academic literature. We discuss attacks on the integrity of the election, attacks on the privacy of voters, and attacks aiming at...
received 5 May 2016
Next ►