• Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing 

      Silde, Tjerand; Strand, Martin (Peer reviewed; Journal article, 2022)
      Anonymous single-use tokens have seen recent applications in private Internet browsing and anonymous statistics collection. We develop new schemes in order to include public metadata such as expiration dates for tokens. ...
    • Implementing Lattice-Based Cryptography 

      Rodríguez Rodríguez, Alejandro Royher (Bachelor thesis, 2022)
      The thesis is about implementation of LWE/MLWE encryption schemes in C++ and the use of the Number Theoretic Transform (NTT) in order to get faster mul- tiplication operations over certain rings. We explore how much speed ...
    • Lattice-Based Proof of Shuffle and Applications to Electronic Voting 

      Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor (Peer reviewed; Journal article, 2021)
      A verifiable shuffle of known values is a method for proving that a collection of commitments opens to a given collection of known messages, without revealing a correspondence between commitments and messages. We propose ...
    • Return Codes from Lattice Assumptions 

      Høgåsen, Audhild (Master thesis, 2022)
      Vi presenterer en fremgangsmåte for å lage returkoder for et gitter-basert elektronisk valgsystem. For et valgsystem med fire kontrollkomponenter og kommunikasjon i to runder oppnår protokollen vår en total kommunikasjonsstørrelse ...
    • Use of Messaging Layer Security in a Military UAV Swarm 

      Marstrander, Emil (Master thesis, 2023)
      Forskning på flyvende dronesvermer har fått betydelig interesse de siste årene. En militær dronesverm kan utføre risikofylte oppdrag med lavere risiko for personellet, men introduserer en økt risiko for at fienden ...
    • Verifiable Decryption for BGV 

      Silde, Tjerand (Peer reviewed; Journal article, 2022)
      In this work we present a direct construction for verifiable decryption for the BGV encryption scheme by combining existing zero-knowledge proofs for linear relations and bounded values. This is one of the first constructions ...
    • Verifiable Decryption in the Head 

      Gjøsteen, Kristian; Haines, Thomas Edmund; Müller, Johannes; Rønne, Peter B.; Silde, Tjerand (Peer reviewed; Journal article, 2022)
      In this work we present a new approach to verifiable decryption which converts a 2-party passively secure distributed decryption protocol into a 1-party proof of correct decryption. This leads to an efficient and simple ...