{MUSES}: Efficient {Multi-User} Searchable Encrypted Database

T Le, R Behnia, J Guajardo, T Hoang - 33rd USENIX Security …, 2024 - usenix.org
Searchable encrypted systems enable privacy-preserving keyword search on encrypted
data. Symmetric systems achieve high efficiency (eg, sublinear search), but they mostly …

Secure parallel computation on privately partitioned data and applications

N Attrapadung, H Morita, K Ohara… - Proceedings of the …, 2022 - dl.acm.org
Parallel computation is an important aspect of multi-party computation, not only in terms of
improving efficiency, but also in terms of providing privacy for computation involving …

Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication

J Bai, X Song, X Zhang, Q Wang, S Cui… - Proceedings of the 39th …, 2023 - dl.acm.org
A private decision tree evaluation (PDTE) protocol allows a feature vector owner (FO) to
classify its data using a tree model from a model owner (MO) and only reveals an inference …

Secure Parallel Computation with Oblivious State Transitions

N Attrapadung, K Isayama, K Sadakane… - Proceedings of the 2024 …, 2024 - dl.acm.org
We introduce Oblivious Parallel Stateful Computation (OPSC), a form of secure multi-party
computation (MPC) tailored for stateful machine computation models emphasizing parallel …

Single-shuffle card-based protocol with eight cards per gate

K Tozawa, H Morita, T Mizuki - International Conference on …, 2023 - Springer
Card-based cryptography allows us to securely compute arbitrary functions using a deck of
physical cards. Its performance is mainly measured by the number of used cards and …

Secret-shared shuffle with malicious security

X Song, D Yin, J Bai, C Dong, EC Chang - Cryptology ePrint Archive, 2023 - eprint.iacr.org
A secret-shared shuffle (SSS) protocol permutes a secret-shared vector using a random
secret permutation. It has found numerous applications, however, it is also an expensive …

Constant-Round Private Decision Tree Evaluation for Secret Shared Data

N Cheng, N Gupta, A Mitrokotsa… - … on Privacy Enhancing …, 2024 - petsymposium.org
Decision tree evaluation is extensively used in machine learning to construct accurate
classification models. Often in the cloud-assisted communication paradigm cloud servers …

Single-shuffle card-based protocol with eight cards per gate and its extensions

K Tozawa, H Morita, T Mizuki - Natural Computing, 2025 - Springer
Card-based cryptography allows us to securely compute arbitrary functions using a deck of
physical cards. Its performance is mainly measured by the number of used cards and …

Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization

N Attrapadung, H Morita, K Ohara… - Proceedings of the …, 2022 - dl.acm.org
In this paper, we propose memory-and round-efficient protocols for securely evaluating
arithmetic primitives. We focus on secure two-party computation over the ring ℤ2k that …

Exponential Correlated Randomness Is Necessary in Communication-Optimal Perfectly Secure Two-Party Computation

K Hiwatashi, K Nuida - 4th Conference on Information-Theoretic …, 2023 - drops.dagstuhl.de
Secure two-party computation is a cryptographic technique that enables two parties to
compute a function jointly while keeping each input secret. It is known that most functions …