Candidate obfuscation via oblivious LWE sampling

H Wee, D Wichs - Annual International Conference on the Theory and …, 2021 - Springer
We present a new, simple candidate construction of indistinguishability obfuscation (iO). Our
scheme is inspired by lattices and learning-with-errors (LWE) techniques, but we are unable …

Indistinguishability obfuscation from constant-degree graded encoding schemes

H Lin - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
We construct an indistinguishability obfuscation (IO) scheme for all polynomial-size circuits
from constant-degree graded encoding schemes, assuming the existence of a …

Foundations of homomorphic secret sharing

E Boyle, N Gilboa, Y Ishai, H Lin… - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic
encryption. An HSS scheme supports a local evaluation of functions on shares of one or …

Round optimal secure multiparty computation from minimal assumptions

A Rai Choudhuri, M Ciampi, V Goyal, A Jain… - Theory of Cryptography …, 2020 - Springer
We construct a four round secure multip arty computation (MPC) protocol in the plain model
that achieves security against any dishonest majority. The security of our protocol relies only …

Limits on the power of indistinguishability obfuscation and functional encryption

G Asharov, G Segev - SIAM Journal on Computing, 2016 - SIAM
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a
“central hub” for almost all known cryptographic tasks, and as an extremely powerful …

k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits

F Benhamouda, H Lin - Advances in Cryptology–EUROCRYPT 2018: 37th …, 2018 - Springer
We present new constructions of round-efficient, or even round-optimal, Multi-Party
Computation (MPC) protocols from Oblivious Transfer (OT) protocols. Our constructions …

Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption

Y Luo, Y Chen, T Li, C Tan, H Dou - Journal of Cloud Computing, 2024 - Springer
Cloud computing has data leakage from all parties, security protection of private data, and
existing solutions do not provide a trade-off between security and overhead. With distributed …

Multiparty reusable non-interactive secure computation from LWE

F Benhamouda, A Jain, I Komargodski… - … Conference on the Theory …, 2021 - Springer
Motivated by the goal of designing versatile and flexible secure computation protocols that at
the same time require as little interaction as possible, we present new multiparty reusable …

Two-round adaptively secure MPC from indistinguishability obfuscation

S Garg, A Polychroniadou - Theory of Cryptography: 12th Theory of …, 2015 - Springer
Abstract Adaptively secure Multi-Party Computation (MPC) first studied by Canetti, Feige,
Goldreich, and Naor in 1996, is a fundamental notion in cryptography. Adaptive security is …

Deniable fully homomorphic encryption from learning with errors

S Agrawal, S Goldwasser, S Mossel - … 2021, Virtual Event, August 16–20 …, 2021 - Springer
We define and construct Deniable Fully Homomorphic Encryption based on the Learning
With Errors (LWE) polynomial hardness assumption. Deniable FHE enables storing …