G Couteau, L Devadas, A Hegde, A Jain… - Cryptology ePrint …, 2025 - eprint.iacr.org
Homomorphic secret sharing (HSS) is a distributed analogue of fully-homomorphic encryption (FHE), where subsequent to an input-sharing phase, parties can locally compute …
We put forth and instantiate a new primitive we call simultaneous-message and succinct (SMS) secure computation. An SMS scheme enables a minimal communication pattern for …
P Meyer, C Orlandi, L Roy, P Scholl - Theory of Cryptography Conference, 2025 - Springer
We present a new approach to garbling arithmetic circuits using techniques from homomorphic secret sharing, obtaining constructions with high rate that support free …
P Charbit, G Couteau, P Meyer, R Naserasr - Theory of Cryptography …, 2025 - Springer
We consider the graph-theoretic problem of removing (few) nodes from a directed acyclic graph in order to reduce its depth. While this problem is intractable in the general case, we …
The assumption that certain computations inherently require some sequential time has established itself as a powerful tool for cryptography. It allows for security and liveness …
S Servan-Schreiber - 2025 - sachaservanschreiber.com
Secure computation allows two or more parties, each with a private input, to learn the output of a function computed over their inputs without learning anything else—a fundamental tool …