Two round multiparty computation via multi-key FHE

P Mukherjee, D Wichs - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
We construct a general multiparty computation (MPC) protocol with only two rounds of
interaction in the common random string model, which is known to be optimal. In the honest …

Foundations of garbled circuits

M Bellare, VT Hoang, P Rogaway - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Garbled circuits, a classical idea rooted in the work of Yao, have long been understood as a
cryptographic technique, not a cryptographic goal. Here we cull out a primitive …

Fully secure functional encryption for inner products, from standard assumptions

S Agrawal, B Libert, D Stehlé - Annual International Cryptology …, 2016 - Springer
Functional encryption is a modern public-key paradigm where a master secret key can be
used to derive sub-keys SK_F associated with certain functions F in such a way that the …

Multiparty computation with low communication, computation and interaction via threshold FHE

G Asharov, A Jain, A López-Alt, E Tromer… - Advances in Cryptology …, 2012 - Springer
Fully homomorphic encryption (FHE) enables secure computation over the encrypted data of
a single party. We explore how to extend this to multiple parties, using threshold fully …

Indistinguishability obfuscation from functional encryption

N Bitansky, V Vaikuntanathan - Journal of the ACM (JACM), 2018 - dl.acm.org
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to
almost any known cryptographic object. Prior candidate IO constructions were based on …

Indistinguishability obfuscation from compact functional encryption

P Ananth, A Jain - Annual Cryptology Conference, 2015 - Springer
The arrival of indistinguishability obfuscation (i O i O) has transformed the cryptographic
landscape by enabling several security goals that were previously beyond our reach …

Founding cryptography on oblivious transfer–efficiently

Y Ishai, M Prabhakaran, A Sahai - … , Santa Barbara, CA, USA, August 17-21 …, 2008 - Springer
We present a simple and efficient compiler for transforming secure multi-party computation
(MPC) protocols that enjoy security only with an honest majority into MPC protocols that …

Functional encryption with bounded collusions via multi-party computation

S Gorbunov, V Vaikuntanathan, H Wee - … Barbara, CA, USA, August 19-23 …, 2012 - Springer
We construct functional encryption schemes for polynomial-time computable functions
secure against an a-priori bounded polynomial number of collusions. Our constructions …

Two-round multiparty secure computation from minimal assumptions

S Garg, A Srinivasan - Journal of the ACM, 2022 - dl.acm.org
We provide new two-round multiparty secure computation (MPC) protocols in the dishonest
majority setting assuming the minimal assumption that two-round oblivious transfer (OT) …

Cryptography in

B Applebaum, Y Ishai, E Kushilevitz - SIAM Journal on Computing, 2006 - SIAM
We study the parallel time-complexity of basic cryptographic primitives such as one-way
functions (OWFs) and pseudorandom generators (PRGs). Specifically, we study the …