Ligero: Lightweight sublinear arguments without a trusted setup

S Ames, C Hazay, Y Ishai… - Proceedings of the 2017 …, 2017 - dl.acm.org
We design and implement a simple zero-knowledge argument protocol for NP whose
communication complexity is proportional to the square-root of the verification circuit size …

Feistel structures for MPC, and more

MR Albrecht, L Grassi, L Perrin, S Ramacher… - … –ESORICS 2019: 24th …, 2019 - Springer
Efficient PRP/PRFs are instrumental to the design of cryptographic protocols. We investigate
the design of dedicated PRP/PRFs for three application areas-secure multiparty computation …

SoK: oblivious pseudorandom functions

S Casacuberta, J Hesse… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
In recent years, oblivious pseudorandom functions (OPRFs) have become a ubiquitous
primitive used in cryptographic protocols and privacy-preserving technologies. The growing …

Crypto dark matter on the torus: Oblivious prfs from shallow prfs and tfhe

MR Albrecht, A Davidson, A Deo… - … Conference on the Theory …, 2024 - Springer
Abstract Partially Oblivious Pseudorandom Functions (POPRFs) are 2-party protocols that
allow a client to learn pseudorandom function (PRF) evaluations on inputs of its choice from …

ThorPIR: single server PIR via homomorphic thorp shuffles

B Fisch, A Lazzaretti, Z Liu… - Proceedings of the 2024 on …, 2024 - dl.acm.org
Private Information Retrieval (PIR) is a two player protocol where the client, given some
query x ε [N], interacts with the server, which holds a N-bit string DB, in order to privately …

Correlated pseudorandom functions from variable-density LPN

E Boyle, G Couteau, N Gilboa, Y Ishai… - 2020 IEEE 61st …, 2020 - ieeexplore.ieee.org
Correlated secret randomness is a useful resource for many cryptographic applications. We
initiate the study of pseudorandom correlation functions (PCFs) that offer the ability to …

Quietot: Lightweight oblivious transfer with a public-key setup

G Couteau, L Devadas, S Devadas, A Koch… - … Conference on the …, 2025 - Springer
Oblivious Transfer (OT) is at the heart of secure computation and is a foundation for many
applications in cryptography. Over two decades of work have led to extremely efficient …

Proving as fast as computing: succinct arguments with constant prover overhead

N Ron-Zewi, RD Rothblum - Proceedings of the 54th Annual ACM …, 2022 - dl.acm.org
Succinct arguments are proof systems that allow a powerful, but untrusted, prover to
convince a weak verifier that an input x belongs to a language L∈ NP, with communication …

Hardness of noise-free learning for two-hidden-layer neural networks

S Chen, A Gollakota, A Klivans… - Advances in Neural …, 2022 - proceedings.neurips.cc
We give superpolynomial statistical query (SQ) lower bounds for learning two-hidden-layer
ReLU networks with respect to Gaussian inputs in the standard (noise-free) model. No …

Single secret leader election

D Boneh, S Eskandarian, L Hanzlik… - Proceedings of the 2nd …, 2020 - dl.acm.org
In a Single Secret Leader Election (SSLE), a group of participants aim to randomly choose
exactly one leader from the group with the restriction that the identity of the leader will be …