Succinct homomorphic secret sharing
This work introduces homomorphic secret sharing (HSS) with succinct share size. In HSS,
private inputs are shared between parties, who can then homomorphically evaluate a …
private inputs are shared between parties, who can then homomorphically evaluate a …
Amortizing rate-1 OT and applications to PIR and PSI
Recent new constructions of rate-1 OT Döttling, Garg, Ishai, Malavolta, Mour, and Ostrovsky,
CRYPTO 2019 have brought this primitive under the spotlight and the techniques have led …
CRYPTO 2019 have brought this primitive under the spotlight and the techniques have led …
Batch-OT with optimal rate
We show that it is possible to perform n independent copies of 1-out-of-2 oblivious transfer in
two messages, where the communication complexity of the receiver and sender (each) is n …
two messages, where the communication complexity of the receiver and sender (each) is n …
Simultaneous-Message and Succinct Secure Computation
We put forth and instantiate a new primitive we call simultaneous-message and succinct
(SMS) secure computation. An SMS scheme enables a minimal communication pattern for …
(SMS) secure computation. An SMS scheme enables a minimal communication pattern for …
A framework for statistically sender private OT with optimal rate
Statistical sender privacy (SSP) is the strongest achievable security notion for two-message
oblivious transfer (OT) in the standard model, providing statistical security against malicious …
oblivious transfer (OT) in the standard model, providing statistical security against malicious …
XSPIR: efficient symmetrically private information retrieval from Ring-LWE
Abstract Private Information Retrieval (PIR) allows a client to retrieve one entry from a
database held by a server, while hiding from the server which entry has been retrieved …
database held by a server, while hiding from the server which entry has been retrieved …
Minicrypt primitives with algebraic structure and applications
Algebraic structure lies at the heart of much of Cryptomania as we know it. An interesting
question is the following: instead of building (Cryptomania) primitives from concrete …
question is the following: instead of building (Cryptomania) primitives from concrete …
New constructions of hinting PRGs, OWFs with encryption, and more
Over the last few years, there has been a surge of new cryptographic results, including
laconic oblivious transfer [13, 16],(anonymous/hierarchical) identity-based encryption [9] …
laconic oblivious transfer [13, 16],(anonymous/hierarchical) identity-based encryption [9] …
Lower-Bounds on Public-Key Operations in PIR
Private information retrieval (PIR) is a fundamental cryptographic primitive that allows a user
to fetch a database entry without revealing to the server which database entry it learns. PIR …
to fetch a database entry without revealing to the server which database entry it learns. PIR …
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate
We give a construction of a two-round batch oblivious transfer (OT) protocol in the CRS
model that is UC-secure against malicious adversaries and has (near) optimal …
model that is UC-secure against malicious adversaries and has (near) optimal …