Spartan and bulletproofs are simulation-extractable (for free!)

Q Dao, P Grubbs - Annual International Conference on the Theory and …, 2023 - Springer
Increasing deployment of advanced zero-knowledge proof systems, especially zkSNARKs,
has raised critical questions about their security against real-world attacks. Two classes of …

Witness-succinct universally-composable snarks

C Ganesh, Y Kondi, C Orlandi, M Pancholi… - … Conference on the …, 2023 - Springer
Abstract Zero-knowledge Succinct Non-interactive ARguments of Knowledge (zkSNARKs)
are becoming an increasingly fundamental tool in many real-world applications where the …

Somewhere statistical soundness, post-quantum security, and SNARGs

YT Kalai, V Vaikuntanathan, RY Zhang - Theory of Cryptography …, 2021 - Springer
The main conceptual contribution of this paper is a unification of two leading paradigms for
constructing succinct argument systems, namely Kilian's protocol and the BMW (Biehl-Meyer …

PLASMA: Private, lightweight aggregated statistics against malicious adversaries

D Mouris, P Sarkar, NG Tsoutsos - Proceedings on Privacy …, 2024 - petsymposium.org
Private heavy-hitters is a data-collection task where multiple clients possess private bit
strings, and data-collection servers aim to identify the most popular strings without learning …

Round-optimal oblivious transfer and MPC from computational CSIDH

S Badrinarayanan, D Masny, P Mukherjee… - … Conference on Public …, 2023 - Springer
We present the first round-optimal and plausibly quantum-safe oblivious transfer (OT) and
multi-party computation (MPC) protocols from the computational CSIDH assumption–the …

CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks

Y Wang, P Sarkar, N Koti, A Patra… - arXiv preprint arXiv …, 2023 - arxiv.org
Secure Multiparty Computation (MPC) protocols enable secure evaluation of a circuit by
several parties, even in the presence of an adversary who maliciously corrupts all but one of …

Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge

S Chakraborty, C Ganesh, P Sarkar - … on the Theory and Applications of …, 2023 - Springer
In the setting of subversion, an adversary tampers with the machines of the honest parties
thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov …

The brave new world of global generic groups and UC-secure zero-overhead SNARKs

J Bobolz, P Farshim, M Kohlweiss… - Theory of Cryptography …, 2024 - Springer
The universal composability (UC) model provides strong security guarantees for protocols
used in arbitrary contexts. While these guarantees are highly desirable, in practice, schemes …

Agile cryptography: a universally composable approach

C Badertscher, M Ciampi, A Kiayias - Theory of Cryptography Conference, 2023 - Springer
Being capable of updating cryptographic algorithms is an inevitable and essential practice in
cryptographic engineering. This cryptographic agility, as it has been called, is a fundamental …

Randomized oblivious transfer for secure multiparty computation in the quantum setting

B Costa, P Branco, M Goulão, M Lemus, P Mateus - Entropy, 2021 - mdpi.com
Secure computation is a powerful cryptographic tool that encompasses the evaluation of any
multivariate function with arbitrary inputs from mutually distrusting parties. The oblivious …