Succinct homomorphic secret sharing

D Abram, L Roy, P Scholl - Annual International Conference on the Theory …, 2024 - Springer
This work introduces homomorphic secret sharing (HSS) with succinct share size. In HSS,
private inputs are shared between parties, who can then homomorphically evaluate a …

Amortizing rate-1 OT and applications to PIR and PSI

M Chase, S Garg, M Hajiabadi, J Li, P Miao - Theory of Cryptography: 19th …, 2021 - Springer
Recent new constructions of rate-1 OT Döttling, Garg, Ishai, Malavolta, Mour, and Ostrovsky,
CRYPTO 2019 have brought this primitive under the spotlight and the techniques have led …

Batch-OT with optimal rate

Z Brakerski, P Branco, N Döttling, S Pu - … on the Theory and Applications of …, 2022 - Springer
We show that it is possible to perform n independent copies of 1-out-of-2 oblivious transfer in
two messages, where the communication complexity of the receiver and sender (each) is n …

Simultaneous-Message and Succinct Secure Computation

E Boyle, A Jain, S Servan-Schreiber… - Cryptology ePrint …, 2025 - eprint.iacr.org
We put forth and instantiate a new primitive we call simultaneous-message and succinct
(SMS) secure computation. An SMS scheme enables a minimal communication pattern for …

A framework for statistically sender private OT with optimal rate

P Branco, N Döttling, A Srinivasan - Annual International Cryptology …, 2023 - Springer
Statistical sender privacy (SSP) is the strongest achievable security notion for two-message
oblivious transfer (OT) in the standard model, providing statistical security against malicious …

XSPIR: efficient symmetrically private information retrieval from Ring-LWE

C Lin, Z Liu, T Malkin - European Symposium on Research in Computer …, 2022 - Springer
Abstract Private Information Retrieval (PIR) allows a client to retrieve one entry from a
database held by a server, while hiding from the server which entry has been retrieved …

Minicrypt primitives with algebraic structure and applications

N Alamati, H Montgomery, S Patranabis, A Roy - Journal of Cryptology, 2023 - Springer
Algebraic structure lies at the heart of much of Cryptomania as we know it. An interesting
question is the following: instead of building (Cryptomania) primitives from concrete …

New constructions of hinting PRGs, OWFs with encryption, and more

R Goyal, S Vusirikala, B Waters - … CRYPTO 2020, Santa Barbara, CA, USA …, 2020 - Springer
Over the last few years, there has been a surge of new cryptographic results, including
laconic oblivious transfer [13, 16],(anonymous/hierarchical) identity-based encryption [9] …

Lower-Bounds on Public-Key Operations in PIR

J Dujmovic, M Hajiabadi - Annual International Conference on the Theory …, 2024 - Springer
Private information retrieval (PIR) is a fundamental cryptographic primitive that allows a user
to fetch a database entry without revealing to the server which database entry it learns. PIR …

Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate

P Branco, N Döttling, A Srinivasan - … on the Theory and Applications of …, 2024 - Springer
We give a construction of a two-round batch oblivious transfer (OT) protocol in the CRS
model that is UC-secure against malicious adversaries and has (near) optimal …