PLASMA: Private, lightweight aggregated statistics against malicious adversaries

D Mouris, P Sarkar, NG Tsoutsos - Proceedings on Privacy …, 2024 - petsymposium.org
Private heavy-hitters is a data-collection task where multiple clients possess private bit
strings, and data-collection servers aim to identify the most popular strings without learning …

Round-optimal oblivious transfer and MPC from computational CSIDH

S Badrinarayanan, D Masny, P Mukherjee… - … Conference on Public …, 2023 - Springer
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and
multi-party computation (MPC) protocols from the computational CSIDH assumption–the …

CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks

Y Wang, P Sarkar, N Koti, A Patra… - arXiv preprint arXiv …, 2023 - arxiv.org
Secure Multiparty Computation (MPC) protocols enable secure evaluation of a circuit by
several parties, even in the presence of an adversary who maliciously corrupts all but one of …

Triply adaptive uc nizk

R Canetti, P Sarkar, X Wang - International Conference on the Theory and …, 2022 - Springer
Non-interactive zero knowledge (NIZK) enables proving the validity of NP statement without
leaking anything else. We study multi-instance NIZKs in the common reference string (CRS) …

Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge

S Chakraborty, C Ganesh, P Sarkar - … on the Theory and Applications of …, 2023 - Springer
In the setting of subversion, an adversary tampers with the machines of the honest parties
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …

[图书][B] Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore …

M Tibouchi, H Wang - 2021 - books.google.com
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the
proceedings of the 27th International Conference on the Theory and Application of …

Secure Auctions in the Presence of Rational Adversaries

C Ganesh, B Kanukurthi, G Shankar - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Sealed bid auctions are used to allocate a resource among a set of interested parties.
Traditionally, auctions need the presence of a trusted auctioneer to whom the bidders …

Secure Vickrey Auctions with Rational Parties

C Ganesh, S Gupta, B Kanukurthi… - Proceedings of the 2024 on …, 2024 - dl.acm.org
In this work, we construct a second price (Vickrey) auction protocol (SPA), which does not
require any auctioneers and ensures total privacy in the presence of rational parties …

Reverse firewalls for adaptively secure MPC without setup

S Chakraborty, C Ganesh, M Pancholi… - … Conference on the Theory …, 2021 - Springer
We study Multi-party computation (MPC) in the setting of subversion, where the adversary
tampers with the machines of honest parties. Our goal is to construct actively secure MPC …

Two-round adaptively secure MPC from isogenies, LPN, or CDH

N Alamati, H Montgomery, S Patranabis… - … Conference on the Theory …, 2021 - Springer
We present a new framework for building round-optimal (two-round) adaptively secure MPC.
We show that a relatively weak notion of OT that we call indistinguishability OT with receiver …