Indistinguishability Obfuscation from LPN over , DLIN, and PRGs in NC

A Jain, H Lin, A Sahai - Annual International Conference on the Theory …, 2022 - Springer
In this work, we study what minimal sets of assumptions suffice for constructing
indistinguishability obfuscation (i O). We prove: Theorem (Informal): Assume sub …

Indistinguishability obfuscation from bilinear maps and LPN variants

S Ragavan, N Vafa, V Vaikuntanathan - Theory of Cryptography …, 2025 - Springer
We construct an indistinguishability obfuscation (IO) scheme from the sub-exponential
hardness of the decisional linear problem on bilinear groups together with two variants of …

Laconic function evaluation and applications

W Quach, H Wee, D Wichs - 2018 IEEE 59th Annual …, 2018 - ieeexplore.ieee.org
We introduce a new cryptographic primitive called laconic function evaluation (LFE). Using
LFE, Alice can compress a large circuit f into a small digest. Bob can encrypt some data x …

Multi-key fully-homomorphic encryption in the plain model

P Ananth, A Jain, Z **, G Malavolta - … Durham, NC, USA, November 16–19 …, 2020 - Springer
The notion of multi-key fully homomorphic encryption (multi-key FHE)[López-Alt, Tromer,
Vaikuntanathan, STOC'12] was proposed as a generalization of fully homomorphic …

Multiparty reusable non-interactive secure computation from LWE

F Benhamouda, A Jain, I Komargodski… - … Conference on the Theory …, 2021 - Springer
Motivated by the goal of designing versatile and flexible secure computation protocols that at
the same time require as little interaction as possible, we present new multiparty reusable …

Robust combiners and universal constructions for quantum cryptography

T Hiroka, F Kitagawa, R Nishimaki… - Theory of Cryptography …, 2024 - Springer
A robust combiner combines many candidates for a cryptographic primitive and generates a
new candidate for the same primitive. Its correctness and security hold as long as one of the …

Adaptively secure MPC with sublinear communication complexity

R Cohen, A Shelat, D Wichs - … in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
A central challenge in the study of MPC is to balance between security guarantees,
hardness assumptions, and resources required for the protocol. In this work, we study the …

Reusable two-round MPC from DDH

J Bartusek, S Garg, D Masny, P Mukherjee - Theory of Cryptography: 18th …, 2020 - Springer
We present a reusable two-round multi-party computation (MPC) protocol from the
Decisional Diffie Hellman assumption (DDH). In particular, we show how to upgrade any …

MPC with low bottleneck-complexity: Information-theoretic security and more

H Keller, C Orlandi, A Paskin-Cherniavsky… - Cryptology ePrint …, 2023 - eprint.iacr.org
The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a
measure of the maximum number of bits which are sent and received by any party in a …

Combiners for functional encryption, unconditionally

A Jain, N Manohar, A Sahai - … 39th Annual International Conference on the …, 2020 - Springer
Functional encryption (FE) combiners allow one to combine many candidates for a
functional encryption scheme, possibly based on different computational assumptions, into …