Abstract. We present oblivious implementations of several data structures for secure multiparty com-putation (MPC) such as arrays, dictionaries, and priority queues. The resulting oblivious data structures have only polylogarithmic overhead compared with their classical counterparts. To achieve this, we give secure multiparty protocols for the ORAM of Shi et al. (Asiacrypt ‘11) and the Path ORAM scheme of Stefanov et al. (CCS ‘13), and we compare the resulting implementations. We subsequently use our oblivious priority queue for secure computation of Dijkstra’s shortest path algorithm on general graphs, where the graph structure is secret. To the best of our knowledge, this is the first implementation of a non-trivial graph algorithm in mul...
We design novel, asymptotically more efficient data structures and algorithms for programs whose dat...
The growing influence of the Internet and other communication networks on our daily lives and on the...
We give constructions of three-round secure multiparty computation (MPC) protocols for general funct...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
We present a simple and fast protocol to securely solve the (single source) Shortest Path Problem, b...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Abstract. We present an oblivious machine, a concrete notion for a multiparty random access machine ...
We present Private Random Access Computations (PRAC), a 3-party Secure Multi-Party Computation (MPC)...
In this paper, we describe efficient protocols to perform in parallel many reads and writes in priva...
Abstract. A multiparty computation (MPC) protocol allows a set of players to compute a function of t...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Abstract. We propose a simple and efficient sorting algorithm for secure multi-party computation (MP...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
An Oblivious RAM (ORAM) protocol allows a client to access memory outsourced at the server without l...
We design novel, asymptotically more efficient data structures and algorithms for programs whose dat...
The growing influence of the Internet and other communication networks on our daily lives and on the...
We give constructions of three-round secure multiparty computation (MPC) protocols for general funct...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
We present a simple and fast protocol to securely solve the (single source) Shortest Path Problem, b...
Secure Multiparty Computation (MPC) allows a set of parties, each having its own private data, to co...
Abstract. We present an oblivious machine, a concrete notion for a multiparty random access machine ...
We present Private Random Access Computations (PRAC), a 3-party Secure Multi-Party Computation (MPC)...
In this paper, we describe efficient protocols to perform in parallel many reads and writes in priva...
Abstract. A multiparty computation (MPC) protocol allows a set of players to compute a function of t...
Multiparty computation (MPC) is a powerful and generic cryptographic framework capable of realizing ...
Abstract. We propose a simple and efficient sorting algorithm for secure multi-party computation (MP...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Secure multi-party computation (MPC) enables mutually distrusting parties to compute securely over t...
An Oblivious RAM (ORAM) protocol allows a client to access memory outsourced at the server without l...
We design novel, asymptotically more efficient data structures and algorithms for programs whose dat...
The growing influence of the Internet and other communication networks on our daily lives and on the...
We give constructions of three-round secure multiparty computation (MPC) protocols for general funct...