Correlated oblivious transfer (COT) is a crucial building block for secure multi-party computation (MPC) and can be generated efficiently via OT extension. Recent works based on the pseudorandom correlation generator (PCG) paradigm presented a new way to generate random COT correlations using only communication sublinear to the output length. However, due to their high computational complexity, these protocols are only faster than the classical IKNP-style OT extension under restricted network bandwidth. In this paper, we propose new COT protocols in the PCG paradigm that achieve unprecedented performance. With 50 Mbps network bandwidth, our maliciously secure protocol can produce one COT correlation in 22 nanoseconds. More specifically, ou...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Adaptive security embodies one of the strongest notions of security that allows an adversary to corr...
Secure multiparty computation can often utilize a trusted source of correlated randomness to achieve...
International audienceSecure multiparty computation (MPC) often relies on sources of correlated rand...
The computational overhead of a cryptographic task is the asymptotic ratio between the computational...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
International audienceThis paper describes a 1-out-of-N oblivious transfer (OT) extension protocol w...
International audienceWe consider the problem of securely generating useful instances of two-party c...
International audienceSecure computation often benefits from the use of correlated randomness to ach...
Oblivious Transfer (OT) is one of the most fundamental cryptographic primitives with wide-spread app...
We present a new protocol for two-party private set intersection (PSI) with semi-honest security in ...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful sources o...
Correlated secret randomness is a useful resource for many cryptographic applications. We initiate ...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Adaptive security embodies one of the strongest notions of security that allows an adversary to corr...
Secure multiparty computation can often utilize a trusted source of correlated randomness to achieve...
International audienceSecure multiparty computation (MPC) often relies on sources of correlated rand...
The computational overhead of a cryptographic task is the asymptotic ratio between the computational...
Secure two-party computation allows two parties to evaluate a function on their private inputs while...
International audienceThis paper describes a 1-out-of-N oblivious transfer (OT) extension protocol w...
International audienceWe consider the problem of securely generating useful instances of two-party c...
International audienceSecure computation often benefits from the use of correlated randomness to ach...
Oblivious Transfer (OT) is one of the most fundamental cryptographic primitives with wide-spread app...
We present a new protocol for two-party private set intersection (PSI) with semi-honest security in ...
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used...
A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful sources o...
Correlated secret randomness is a useful resource for many cryptographic applications. We initiate ...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Adaptive security embodies one of the strongest notions of security that allows an adversary to corr...