Tight zk cpu: Batched zk branching with cost proportional to evaluated instruction

Y Yang, D Heath, C Hazay, V Kolesnikov… - Proceedings of the …, 2024 - dl.acm.org
We explore Zero-Knowledge Proofs (ZKPs) of statements expressed as programs written in
high-level languages, eg, C or assembly. At the core of executing such programs in ZK is the …

Efficient permutation correlations and batched random access for two-party computation

S Peceny, S Raghuraman, P Rindal… - Cryptology ePrint …, 2024 - eprint.iacr.org
In this work we formalize the notion of a two-party permutation correlation $(A, B),(C,\pi) $ st
$\pi (A)= B+ C $ for a random permutation $\pi $ of $ n $ elements and vectors $ A, B …

Privacy-preserving dijkstra

B Ostrovsky - Annual International Cryptology Conference, 2024 - Springer
Given a graph G (V, E), represented as a secret-sharing of an adjacency list, we show how
to obliviously convert it into an alternative, MPC-friendly secret-shared representation, so …

Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers

A Acharaya, C Hazay, V Kolesnikov… - Annual International …, 2024 - Springer
Abstract SCALES (Small Clients And Larger Ephemeral Servers) model is a recently
proposed model for MPC (Acharya et al., TCC 2022). While the SCALES model offers …

Smaug: Modular Augmentation of LLVM for MPC

R Garg, X Wang - Cryptology ePrint Archive, 2025 - eprint.iacr.org
Secure multi-party computation (MPC) is a crucial tool for privacy-preserving computation,
but it is getting increasingly complicated due to recent advancements and optimizations …

Fast ORAM with server-aided preprocessing and pragmatic privacy-efficiency trade-off

V Kolesnikov, S Peceny, N Trieu, X Wang - Cryptography and …, 2024 - Springer
Data-dependent accesses to memory are necessary for many real-world applications, but
their cost remains prohibitive in secure computation. Prior work either focused on minimizing …

Logstar: Efficient Linear* Time Secure Merge

S Chakraborty, S Peceny, S Raghuraman… - Cryptology ePrint …, 2024 - eprint.iacr.org
Secure merge considers the problem of combining two sorted lists into a single sorted secret-
shared list. Merge is a fundamental building block for many real-world applications. For …