Professor Nigel P Smart

B.Sc.(R'dg), Ph.D.(Kent)

  • BS8 1UB

1992 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference Contribution (Conference Proceeding)
2019

MPC Joins The Dark Side

Cartlidge, J., Smart, N. & Talibi Alaoui, Y., 12 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 148-159 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
2 Citations (Scopus)
336 Downloads (Pure)
2018

CAPA: The Spirit of Beaver Against Physical Attacks

Reparaz, O., De Meyer, L., Bilgin, B., Arribas, V., Nikova, S., Nikov, V. & Smart, N., Sep 2018, Advanced in Cryptology - CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II. Springer, Cham, p. 121-151 31 p. (Lecture Notes in Computer Science; vol. 10991).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)

Reducing Communication Channels in MPC

Keller, M., Rotaru, D., Smart, N. & Wood, T., Sep 2018, Security and Cryptography for Networks - SCN 2018. Catalano, D. & de Prisco, R. (eds.). Springer Berlin Heidelberg, p. 181-199 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
4 Citations (Scopus)
2017

Faster Homomorphic Evaluation of Discrete Fourier Transforms

Costache, A., Smart, N. & Vivek, S., 23 Dec 2017, Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Springer, Cham, p. 517-529 13 p. (Lecture Notes in Computer Science; vol. 10322).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
4 Citations (Scopus)

Fixed-point arithmetic in SHE schemes

Costache, A., Smart, N., Vivek, S. & Waller, A., 20 Oct 2017, Selected Areas in Cryptography - SAC 2016: 23rd International Conference, St. John’s, NL, Canada, August 10-12, Revised Selected Papers. Springer, p. 401-422 22 p. (Lecture Notes in Computer Science; vol. 10532).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
10 Citations (Scopus)

Generic Forward-Secure Key Agreement Without Signatures

Delpech de Saint Guilhem, C., Smart, N. & Warinschi, B., 20 Sep 2017, Information Security - ISC 2017: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24 2017. Proceedings. Springer, Cham, p. 114-133 20 p. (Lecture Notes in Computer Science; vol. 10599).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Multi-rate threshold FlipThem

Leslie, D., Sherfield, C. & Smart, N., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part II. Springer, Vol. 10493. p. 174-190 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

Albrecht, M., Orsini, E., Patterson, K. G., Peer, G. & Smart, N. P., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part I. Springer, Vol. 10492. p. 29-46 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)

When It’s All Just Too Much: Outsourcing MPC-Preprocessing

Scholl, P., Smart, N. & Wood, T., 25 Nov 2017, Cryptography and Coding - IMACC 2017: 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017. Proceedings. Springer, p. 77-99 23 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)
2016

Linear Overhead Optimally-resilient Robust MPC Using Preprocessing

Choudhury, A., Orsini, E., Patra, A. & Smart, N., 2016, Security and Cryptography for Networks - SCN 2016: 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings. Zikas, V. & De Prisco, R. (eds.). Springer, Vol. 9841. p. 147-168 22 p. (Lecture Notes in Computer Science; vol. 9841).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
1 Citation (Scopus)

More Efficient Constant-Round Multi-Party Computation from BMR and SHE

Lindell, Y., Smart, N. & Soria-Vázquez, E., Nov 2016, Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I. Springer, p. 554-581 28 p. (Lecture Notes in Computer Science; vol. 9985).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
13 Citations (Scopus)

MPC-Friendly Symmetric Key Primitives

Grassi, L., Rechberger, C., Rotaru, D., Scholl, P. & Smart, N., 24 Oct 2016, ACM Conference on Computer and Communications Security - CCS 2016. Association for Computing Machinery (ACM), p. 430-443 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
16 Citations (Scopus)

Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?

Costache, A. & Smart, N. P., 29 Feb 2016, Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings. Springer, p. 325-340 16 p. (Lecture Notes in Computer Science; vol. 9610).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
27 Citations (Scopus)
2015

Bootstrapping BGV ciphertexts with a wider choice of p and q

Orsini, E. A., van de Pol, J. & Smart, N. P., 30 Mar 2015, Public-Key Cryptography - PKC 2015. Katz, J. (ed.). Springer Berlin Heidelberg, p. 673-698 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9020).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ

Lindell, Y., Pinkas, B., Smart, N. & Yanai, A., 19 Aug 2015, Advances in Cryptology - CRYPTO 2015. Springer, Vol. 9216. p. 319-338 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
40 Citations (Scopus)

Just a Little Bit More

van de Pol, J., Smart, N. P. & Yarom, Y., 20 Apr 2015, Topics in Cryptology - CT-RSA 2015. Nyberg, K. (ed.). Springer International Publishing AG, Vol. 9048. p. 3-21 (Lecture Notes in Computer Science; vol. 9048).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
33 Citations (Scopus)

Threshold FlipThem: When the winner does not need to take all

Leslie, D., Sherfield, C. & Smart, N., 4 Nov 2015, Decision and Game Theory for Security - GameSec 2015. Springer, Vol. 9406. p. 74-92 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)
2014

Actively Secure Private Function Evaluation

Mohassel, P., Sadeghian, S. S. & Smart, N. P., 2014, Advances in Cryptology - ASIACRYPT 2014. Sarkar, P. & Iwata, T. (eds.). Springer, Vol. 8874. p. 486-505 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

Dishonest Majority Multi-Party Computation for Binary Circuits

Larraia De Vega, E., Orsini, E. & Smart, N. P., 2014, Advances in Cryptology - CRYPTO 2014. Garay, J. A. & Gennaro, R. (eds.). Springer, Vol. 8617. p. 495-512 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

21 Citations (Scopus)

'Ooh Aah... Just a Little Bit' : A Small Amount of Side Channel Can Go a Long Way

Benger, N., van de Pol, J., Smart, N. P. & Yarom, Y., 23 Sep 2014, Cryptographic Hardware and Embedded Systems - CHES 2014. Batina, L. & Robshaw, M. (eds.). Springer Verlag, Vol. 8731. p. 75-92 (Lecture Notes in Computer Science; vol. 8731).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Reducing the Overhead of MPC over a Large Population

Choudhary, A., Patra, A. & Smart, N. P., 29 Aug 2014, Security and Cryptography for Networks - SCN 2014. Springer Verlag, Vol. 8642. p. 197-217 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)
2013

An Analysis of the EMV Channel Establishment Protocol

Brzuska, C., Smart, N. P., Warinschi, B. & Watson, G., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 373-386

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

20 Citations (Scopus)

An Architecture for Practical Actively Secure MPC with Dishonest Majority

Keller, M. K. S., Scholl, P. & Smart, N. P., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 549-560

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

38 Citations (Scopus)

Between a Rock and a Hard Place: Interpolating between MPC and FHE

Choudhury, A., Loftus, J. J., Orsini, E. A., Patra, A. & Smart, N. P., Dec 2013, Advances in Cryptology - ASIACRYPT 2013. Springer Verlag, Vol. 8270. p. 221-240 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

Estimating Key Sizes for High Dimensional Lattice-Based Systems

van de Pol, J. & Smart, N. P., Dec 2013, Proc. Cryptography and Coding. Springer, Vol. 8308. p. 290-303 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

24 Citations (Scopus)

Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits

Damgård, I., Keller, M., Larraia, E., Pastro, V., Scholl, P. & Smart, N. P., 2013, Computer Security - ESORICS 2013. Crampton, J., Jajodia, S. & Mayes, K. (eds.). Springer, Vol. 8134. p. 1-18 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

139 Citations (Scopus)

The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users

Bond, M., French, G., Smart, N. P. & Watson, G. J., 2013, Topics in Cryptology - CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 359-374 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)
2012

Better Bootstrapping in Fully Homomorphic Encryption

Gentry, C., Halevi, S. & Smart, N. P., 2012, Public Key Cryptography - PKC 2012. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer Berlin Heidelberg, Vol. 7293. p. 1-16 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

98 Citations (Scopus)

Efficient Two-Move Blind Signatures in the Common Reference String Model

Ghadafi, E. & Smart, N. P., 2012, Information Security - ISC 2012. Springer, Vol. 7483. p. 274-289 16 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

7 Citations (Scopus)

Fully Homomorphic Encryption with Polylog Overhead

Gentry, C., Halevi, S. & Smart, N. P., 2012, Advances in Cryptology - EUROCRYPT 2012. Pointcheval, D. & Johansson, T. (eds.). Springer Berlin Heidelberg, Vol. 7237. p. 465-482 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

217 Citations (Scopus)

Homomorphic Evaluation of the AES Circuit

Gentry, C., Halevi, S. & Smart, N. P., 2012, Advances in Cryptology - CRYPTO 2012. Safavi-Naini, R. & Canetti, R. (eds.). Springer Berlin Heidelberg, Vol. 7417. p. 850-867 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

295 Citations (Scopus)

Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol

Damgård, I., Keller, M., Larraia, E., Miles, C. & Smart, N. P., 2012, Security and Cryptography for Networks - SCN 2012. Springer, Vol. 7485. p. 241-263 23 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

32 Citations (Scopus)

Multiparty Computation from Somewhat Homomorphic Encryption

Damgård, I., Pastro, V., Smart, N. P. & Zakarias, S., 2012, Advances in Cryptology - CRYPTO 2012. Safavi-Naini, R. & Canetti, R. (eds.). Springer Berlin Heidelberg, Vol. 7417. p. 643-662 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

363 Citations (Scopus)

On CCA-Secure Somewhat Homomorphic Encryption

Loftus, J., May, A., Smart, N. P. & Vercauteren, F., 2012, Selected Areas in Cryptography - SAC 2011. Miri, A. & Vaudenay, S. (eds.). Springer Berlin Heidelberg, Vol. 7118. p. 55-72 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

20 Citations (Scopus)

On the Joint Security of Encryption and Signature in EMV

Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, Topics in Cryptology - CT-RSA 2012. Dunkelman, O. (ed.). Springer Berlin Heidelberg, Vol. 7178. p. 116-135 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

23 Citations (Scopus)

Ring Switching in BGV-Style Homomorphic Encryption

Gentry, C., Halevi, S., Peikert, C. & Smart, N. P., 2012, Security and Cryptography for Networks - SCN 2012. Springer, Vol. 7485. p. 19-37 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

29 Citations (Scopus)

Using the cloud to determine key strengths

Kleinjung, T., Lenstra, A., Page, D. & Smart, N. P., 2012, Progress in Cryptology - INDOCRYPT 2012. Springer Berlin Heidelberg, Vol. 7668. p. 17-39

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)
2011

Improved Key Generation for Gentry's Fully Homomorphic Encryption Scheme

Scholl, P. & Smart, N. P., 2011, Cryptography and Coding - IMACC 2011. Chen, L. (ed.). Springer Berlin Heidelberg, Vol. 7089. p. 10-22 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

16 Citations (Scopus)

Secure Outsourced Computation

Loftus, J. J. & Smart, N. P., 2011, Progress in Cryptology - AFRICACRYPT 2011. Nitaj, A. & Pointcheval, D. (eds.). BERLIN: Springer Berlin Heidelberg, Vol. 6737. p. 1-20 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

21 Citations (Scopus)
2010

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement

Fiore, D., Gennaro, R. & Smart, N., 2010, Pairing-Based Cryptography - Pairing 2010. Springer Berlin Heidelberg, Vol. 6487. p. 167-186

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries

Smart, N., 2010, Topics in Cryptology - CT-RSA 2010. Springer Berlin Heidelberg, Vol. 5985. p. 15-25

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes

Smart, N. & Vercauteren, F., 2010, Public Key Cryptography - PKC 2010. Springer Berlin Heidelberg, Vol. 6056. p. 420-443

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

433 Citations (Scopus)

Get Shorty via Group Signatures without Encryption

Bichsel, P., Camenisch, J., Neven, G., Smart, N. & Warinschi, B., 2010, Security and Cryptography for Networks - SCN 2010. Springer Berlin Heidelberg, Vol. 6280. p. 381-398

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

56 Citations (Scopus)

Groth–Sahai Proofs Revisited

Ghadafi, E., Smart, N. & Warinschi, B., 2010, Public Key Cryptography - PKC 2010. Springer Berlin Heidelberg, Vol. 6056. p. 177-192

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

41 Citations (Scopus)

On the design and implementation of an efficient DAA scheme

Chen, L., Page, D. & Smart, N., 2010, Smart Card Research and Advanced Application Conference - CARDIS 2010. Springer Berlin Heidelberg, Vol. 6035. p. 223-237 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

57 Citations (Scopus)

The Fiat–Shamir Transform for Group and Ring Signature Schemes

Lee, M-F., Smart, N. & Warinschi, B., 2010, Security and Cryptography for Networks - SCN 2010. Springer Berlin Heidelberg, Vol. 6280. p. 363-380

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)
2009

Distributing the Key Distribution Centre in Sakai–Kasahara Based Systems

Geissler, M. & Smart, N., 2009, Coding and Cryptography - IMACC 2009. Springer Berlin Heidelberg, Vol. 5921. p. 252-262

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

9 Citations (Scopus)

Identity Based Group Signatures from Hierarchical Identity Based Encryption

Smart, N. & Warinschi, B., 2009, Pairings 2009. Springer Berlin Heidelberg, Vol. 5671. p. 150-170

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Practical Zero-Knowledge Proofs for Circuit Evaluation

Ghadafi, E., Smart, N. & Warinschi, B., 2009, Coding and Cryptography - IMACC 2009. Springer Berlin Heidelberg, Vol. 5921. p. 469-494

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Secure Two-Party Computation Is Practical

Pinkas, B., Schneider, T., Smart, N. & Williams, S., 2009, Advances in Cryptology -- ASIACRYPT 2009. Springer Berlin Heidelberg, Vol. 5912. p. 250-267

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

225 Citations (Scopus)