Ligero: Lightweight sublinear arguments without a trusted setup
We design and implement a simple zero-knowledge argument protocol for NP whose
communication complexity is proportional to the square-root of the verification circuit size …
communication complexity is proportional to the square-root of the verification circuit size …
Feistel structures for MPC, and more
Efficient PRP/PRFs are instrumental to the design of cryptographic protocols. We investigate
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …
SoK: oblivious pseudorandom functions
In recent years, oblivious pseudorandom functions (OPRFs) have become a ubiquitous
primitive used in cryptographic protocols and privacy-preserving technologies. The growing …
primitive used in cryptographic protocols and privacy-preserving technologies. The growing …
Crypto dark matter on the torus: Oblivious prfs from shallow prfs and tfhe
Abstract Partially Oblivious Pseudorandom Functions (POPRFs) are 2-party protocols that
allow a client to learn pseudorandom function (PRF) evaluations on inputs of its choice from …
allow a client to learn pseudorandom function (PRF) evaluations on inputs of its choice from …
ThorPIR: single server PIR via homomorphic thorp shuffles
B Fisch, A Lazzaretti, Z Liu… - Proceedings of the 2024 on …, 2024 - dl.acm.org
Private Information Retrieval (PIR) is a two player protocol where the client, given some
query x ε [N], interacts with the server, which holds a N-bit string DB, in order to privately …
query x ε [N], interacts with the server, which holds a N-bit string DB, in order to privately …
Correlated pseudorandom functions from variable-density LPN
Correlated secret randomness is a useful resource for many cryptographic applications. We
initiate the study of pseudorandom correlation functions (PCFs) that offer the ability to …
initiate the study of pseudorandom correlation functions (PCFs) that offer the ability to …
Quietot: Lightweight oblivious transfer with a public-key setup
Oblivious Transfer (OT) is at the heart of secure computation and is a foundation for many
applications in cryptography. Over two decades of work have led to extremely efficient …
applications in cryptography. Over two decades of work have led to extremely efficient …
Proving as fast as computing: succinct arguments with constant prover overhead
Succinct arguments are proof systems that allow a powerful, but untrusted, prover to
convince a weak verifier that an input x belongs to a language L∈ NP, with communication …
convince a weak verifier that an input x belongs to a language L∈ NP, with communication …
Hardness of noise-free learning for two-hidden-layer neural networks
We give superpolynomial statistical query (SQ) lower bounds for learning two-hidden-layer
ReLU networks with respect to Gaussian inputs in the standard (noise-free) model. No …
ReLU networks with respect to Gaussian inputs in the standard (noise-free) model. No …
Single secret leader election
In a Single Secret Leader Election (SSLE), a group of participants aim to randomly choose
exactly one leader from the group with the restriction that the identity of the leader will be …
exactly one leader from the group with the restriction that the identity of the leader will be …