scispace - formally typeset
A

Axel Schröpfer

Publications -  16
Citations -  289

Axel Schröpfer is an academic researcher. The author has contributed to research in topics: Secure multi-party computation & Encryption. The author has an hindex of 9, co-authored 16 publications receiving 276 citations.

Papers
More filters
Journal ArticleDOI

Secure collaborative supply chain planning and inverse optimization ― The JELS model

TL;DR: It is shown how SMC can be successfully employed to enable joint decision-making and benefit sharing in a simple supply chain setting and the notion of "stochastic security" is introduced, a novel approach to assess the additional information a party may learn from joint computation and benefit share.
Proceedings ArticleDOI

L1 - An Intermediate Language for Mixed-Protocol Secure Computation

TL;DR: A new intermediate language (L1) is proposed for optimizing SC compilers which enables efficient implementation of special protocols potentially mixing several general SC protocols and it is shown that only a combined view on algorithm and cryptographic protocol can discover SCs with best run-time performance.
Book ChapterDOI

Automatic Protocol Selection in Secure Two-Party Computations

TL;DR: In this article, the authors propose automatic protocol selection which selects a protocol for each operation resulting in a mix with the best performance so far based on an elaborate performance model, they propose an optimization algorithm and an efficient heuristic for this selection problem.
Proceedings ArticleDOI

On the practical importance of communication complexity for secure multi-party computation protocols

TL;DR: An experimental study of a specific protocol for a real-world sized problem under realistic conditions suggests that the practical performance of the protocol is almost independent of the network performance and it is argued that this result can be generalized to a whole class of SMC protocols.
Book ChapterDOI

Optimal re-encryption strategy for joins in encrypted databases

TL;DR: In this paper, it was shown that there is no algorithm better than O(n 3/2 ) for re-encryptions for n columns, and that there can be no algorithm with a better asymptotic performance than O (n logn).