Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Breaking the \(O(\sqrt{n})\) -Bit Barrier: Byzantine Agreement with Polylog Bits Per Party

    Byzantine agreement (BA), the task of n parties to agree on one of their input bits in the face of malicious agents, is a powerful primitive that lies at the core of a vast range of distributed protocols. Interes...

    Elette Boyle, Ran Cohen, Aarushi Goel in Journal of Cryptology (2023)

  2. No Access

    Article

    Topology-Hiding Communication from Minimal Assumptions

    Topology-hiding broadcast (THB) enables parties communicating over an incomplete network to broadcast messages while hiding the topology from within a given class of graphs. THB is a central tool underlying gener...

    Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin in Journal of Cryptology (2023)

  3. No Access

    Article

    Must the Communication Graph of MPC Protocols be an Expander?

    Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) where a partial network is fixed a priori, and thus corruptions can occur dependent on i...

    Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubáček in Journal of Cryptology (2023)

  4. No Access

    Chapter and Conference Paper

    Sublinear-Communication Secure Multiparty Computation Does Not Require FHE

    Secure computation enables mutually distrusting parties to jointly compute a function on their secret inputs, while revealing nothing beyond the function output. A long-running challenge is understanding the r...

    Elette Boyle, Geoffroy Couteau, Pierre Meyer in Advances in Cryptology – EUROCRYPT 2023 (2023)

  5. No Access

    Chapter and Conference Paper

    Arithmetic Sketching

    This paper introduces arithmetic sketching, an abstraction of a primitive that several previous works use to achieve lightweight, low-communication zero-knowledge verification of secret-shared vectors. An arithme...

    Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs in Advances in Cryptology – CRYPTO 2023 (2023)

  6. No Access

    Chapter and Conference Paper

    Locally Verifiable Distributed SNARGs

    The field of distributed certification is concerned with certifying properties of distributed networks, where the communication topology of the network is represented as an arbitrary graph; each node of the graph...

    Eden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran in Theory of Cryptography (2023)

  7. No Access

    Chapter and Conference Paper

    Oblivious Transfer with Constant Computational Overhead

    The computational overhead of a cryptographic task is the asymptotic ratio between the computational cost of securely realizing the task and that of realizing the task with no security at all.

    Elette Boyle, Geoffroy Couteau, Niv Gilboa in Advances in Cryptology – EUROCRYPT 2023 (2023)

  8. No Access

    Chapter and Conference Paper

    Secure Multiparty Computation with Sublinear Preprocessing

    A common technique for enhancing the efficiency of secure multiparty computation (MPC) with dishonest majority is via preprocessing: In an offline phase, parties engage in an input-independent protocol to secure...

    Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof in Advances in Cryptology – EUROCRYPT 2022 (2022)

  9. No Access

    Chapter and Conference Paper

    Programmable Distributed Point Functions

    A distributed point function (DPF) is a cryptographic primitive that enables compressed additive sharing of a secret unit vector across two or more parties. Despite growing ubiquity within applications and notabl...

    Elette Boyle, Niv Gilboa, Yuval Ishai in Advances in Cryptology – CRYPTO 2022 (2022)

  10. No Access

    Chapter and Conference Paper

    Sublinear Secure Computation from New Assumptions

    Secure computation enables mutually distrusting parties to jointly compute a function on their secret inputs, while revealing nothing beyond the function output. A long-running challenge is understanding the r...

    Elette Boyle, Geoffroy Couteau, Pierre Meyer in Theory of Cryptography (2022)

  11. No Access

    Chapter and Conference Paper

    Correlated Pseudorandomness from Expand-Accumulate Codes

    A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful sources of correlated randomness, such as random oblivious transfers (OT) and vector oblivious linear evaluations (VOL...

    Elette Boyle, Geoffroy Couteau, Niv Gilboa in Advances in Cryptology – CRYPTO 2022 (2022)

  12. No Access

    Chapter and Conference Paper

    Low-Complexity Weak Pseudorandom Functions in \(\mathtt {AC}0[\mathtt {MOD}2]\)

    A weak pseudorandom function (WPRF) is a keyed function \(f_k:\{0,1\}^n\rightarrow \{0,1\}\) ...

    Elette Boyle, Geoffroy Couteau, Niv Gilboa in Advances in Cryptology – CRYPTO 2021 (2021)

  13. Chapter and Conference Paper

    Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation

    Boyle et al. (TCC 2019) proposed a new approach for secure computation in the preprocessing model building on function secret sharing (FSS), where a gate g is evaluated using an FSS scheme for the related offset ...

    Elette Boyle, Nishanth Chandran, Niv Gilboa in Advances in Cryptology – EUROCRYPT 2021 (2021)

  14. No Access

    Chapter and Conference Paper

    Sublinear GMW-Style Compiler for MPC with Preprocessing

    We consider the efficiency of protocols for secure multiparty computation (MPC) with a dishonest majority. A popular approach for the design of such protocols is to employ preprocessing. Before the inputs are kno...

    Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof in Advances in Cryptology – CRYPTO 2021 (2021)

  15. No Access

    Chapter and Conference Paper

    Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation

    Secure multiparty computation (MPC) enables n parties, of which up to t may be corrupted, to perform joint computations on their private inputs while revealing only the outputs. Optimizing the asymptotic and conc...

    Fabrice Benhamouda, Elette Boyle, Niv Gilboa, Shai Halevi in Theory of Cryptography (2021)

  16. Chapter and Conference Paper

    Topology-Hiding Communication from Minimal Assumptions

    Topology-hiding broadcast (THB) enables parties communicating over an incomplete network to broadcast messages while hiding the topology from within a given class of graphs. THB is a central tool underlying gener...

    Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin in Theory of Cryptography (2020)

  17. Chapter and Conference Paper

    Efficient Pseudorandom Correlation Generators from Ring-LPN

    Secure multiparty computation can often utilize a trusted source of correlated randomness to achieve better efficiency. A recent line of work, initiated by Boyle et al. (CCS 2018, Crypto 2019), showed how usef...

    Elette Boyle, Geoffroy Couteau, Niv Gilboa in Advances in Cryptology – CRYPTO 2020 (2020)

  18. Chapter and Conference Paper

    Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs

    Secure computation protocols enable mutually distrusting parties to compute a function of their private inputs while revealing nothing but the output. Protocols with full security (also known as guaranteed output...

    Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof in Advances in Cryptology – ASIACRYPT 2020 (2020)

  19. No Access

    Chapter and Conference Paper

    Homomorphic Secret Sharing from Lattices Without FHE

    Homomorphic secret sharing (HSS) is an analog of somewhat- or fully homomorphic encryption (S/FHE) to the setting of secret sharing, with applications including succinct secure computation, private manipulatio...

    Elette Boyle, Lisa Kohl, Peter Scholl in Advances in Cryptology – EUROCRYPT 2019 (2019)

  20. No Access

    Chapter and Conference Paper

    Efficient Pseudorandom Correlation Generators: Silent OT Extension and More

    Secure multiparty computation (MPC) often relies on correlated randomness for better efficiency and simplicity

    Elette Boyle, Geoffroy Couteau, Niv Gilboa in Advances in Cryptology – CRYPTO 2019 (2019)

previous disabled Page of 3