Non-interactive distributed point functions

E Boyle, L Devadas, S Servan-Schreiber - Cryptology ePrint Archive, 2025 - eprint.iacr.org
Abstract Distributed Point Functions (DPFs) are a useful cryptographic primitive enabling a
dealer to distribute short keys to two parties, such that the keys encode additive secret …

Multi-key homomorphic secret sharing

G Couteau, L Devadas, A Hegde, A Jain… - Cryptology ePrint …, 2025 - eprint.iacr.org
Homomorphic secret sharing (HSS) is a distributed analogue of fully-homomorphic
encryption (FHE), where subsequent to an input-sharing phase, parties can locally compute …

Simultaneous-Message and Succinct Secure Computation

E Boyle, A Jain, S Servan-Schreiber… - Cryptology ePrint …, 2025 - eprint.iacr.org
We put forth and instantiate a new primitive we call simultaneous-message and succinct
(SMS) secure computation. An SMS scheme enables a minimal communication pattern for …

Rate-1 Arithmetic Garbling From Homomorphic Secret Sharing

P Meyer, C Orlandi, L Roy, P Scholl - Theory of Cryptography Conference, 2025 - Springer
We present a new approach to garbling arithmetic circuits using techniques from
homomorphic secret sharing, obtaining constructions with high rate that support free …

A Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction

P Charbit, G Couteau, P Meyer, R Naserasr - Theory of Cryptography …, 2025 - Springer
We consider the graph-theoretic problem of removing (few) nodes from a directed acyclic
graph in order to reduce its depth. While this problem is intractable in the general case, we …

Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More

D Abram, L Roy, M Simkin - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The assumption that certain computations inherently require some sequential time has
established itself as a powerful tool for cryptography. It allows for security and liveness …

[PDF][PDF] New Tools for On-the-Fly Secure Computation

S Servan-Schreiber - 2025 - sachaservanschreiber.com
Secure computation allows two or more parties, each with a private input, to learn the output
of a function computed over their inputs without learning anything else—a fundamental tool …