Thomas Attema
YOU?
Author Swipe
View article: Communication-Efficient Multi-Party Computation for RMS Programs
Communication-Efficient Multi-Party Computation for RMS Programs Open
Despite much progress, general-purpose secure multi-party computation (MPC) with active security may still be prohibitively expensive in settings with large input datasets. This particularly applies to the secure evaluation of graph algori…
View article: Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version)
Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version) Open
The celebrated Fiat–Shamir transformation turns any public-coin interactive proof into a non-interactive one, which inherits the main security properties (in the random oracle model) of the interactive version. While originally considered …
View article: Brief Announcement: Malicious Security Comes for Free in Consensus with Leaders
Brief Announcement: Malicious Security Comes for Free in Consensus with Leaders Open
We consider consensus protocols in the model that is most commonly considered for use in state machine replication, as initiated by Dwork-Lynch-Stockmeyer, then by Castro-Liskov in 1999 with "PBFT."Such protocols guarantee, assuming n play…
View article: Optimizing the decoy-state BB84 QKD protocol parameters
Optimizing the decoy-state BB84 QKD protocol parameters Open
Quantum key distribution (QKD) protocols allow for information theoretically secure distribution of (classical) cryptographic key material. However, due to practical limitations the performance of QKD implementations is somewhat restricted…
View article: Compressed Sigma-Protocols for bilinear circuits and applications to logarithmic-sized transparent Threshold Signature Schemes
Compressed Sigma-Protocols for bilinear circuits and applications to logarithmic-sized transparent Threshold Signature Schemes Open
Recently, there has been a great development in communication-efficient zero-knowledge (ZK) protocols for arithmetic circuit relations. Since any relation can be translated into an arithmetic circuit relation, these primitives are extremel…
View article: A note on short invertible ring elements and applications to cyclotomic and trinomials number fields
A note on short invertible ring elements and applications to cyclotomic and trinomials number fields Open
Ring-SIS based $\\Sigma$-protocols require a challenge set $\\mathcal{C}$ in some ring $R$, usually an order in a number field $L$. These $\\Sigma$-protocols impose various requirements on the subset $\\mathcal{C}$, and finding a good, or …
View article: A New Approach to Privacy-Preserving Clinical Decision Support Systems
A New Approach to Privacy-Preserving Clinical Decision Support Systems Open
Background: Clinical decision support systems (CDSS) are a category of health information technologies that can assist clinicians to choose optimal treatments. These support systems are based on clinical trials and expert knowledge; howeve…
View article: Models for QoS-Aware Capacity Management in Cable Access Networks
Models for QoS-Aware Capacity Management in Cable Access Networks Open
In this article, mathematical models are presented that “map‿ measured or predicted network utilisations to user throughputs for given network configurations (segment capacity, subscription speeds etc.). They provide valuable insights into…
View article: Maintenance decision model for steel bridges: a case in the Netherlands
Maintenance decision model for steel bridges: a case in the Netherlands Open
A probabilistic model is developed to investigate the crack growth development in welded details of orthotropic bridge decks. Bridge decks may contain many of these vulnerable details and bridge reliability cannot always be guaranteed upon…