International audienceSecure computation often benefits from the use of correlated randomness to achieve fast, non-cryptographic online protocols. A recent paradigm put forth by Boyle et al. (CCS 2018, Crypto 2019) showed how pseudorandom correlation generators (PCG) can be used to generate large amounts of useful forms of correlated (pseudo)randomness, using minimal interactions followed solely by local computations, yielding silent secure two-party computation protocols (protocols where the preprocessing phase requires almost no communication). Furthermore, programmable PCG's can be used similarly to generate multiparty correlated randomness to be used in silent secure N-party protocols. Previous works constructed very efficient (non-prog...
A family of hash functions is called “correlation intractable ” if it is hard to find, given a rando...
Many implementations of secure computation use fixed-key AES (modeled as a random permutation); this...
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high ...
Secure computation often benefits from the use of correlated randomness to achieve fast, non-cryptog...
International audienceSecure multiparty computation (MPC) often relies on sources of correlated rand...
Secure multiparty computation can often utilize a trusted source of correlated randomness to achieve...
International audienceWe consider the problem of securely generating useful instances of two-party c...
Abstract We investigate the extent to which correlated secret random-ness can help in secure computa...
A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful sources o...
International audienceCorrelated secret randomness is a useful resource for many cryptographic appli...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
International audienceIn this work we introduce a new (circuit-dependent) homomorphic secret sharing...
Secure multiparty computation (MPC) addresses the challenge of evaluating functions on secret inputs...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
A family of hash functions is called “correlation intractable ” if it is hard to find, given a rando...
Many implementations of secure computation use fixed-key AES (modeled as a random permutation); this...
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high ...
Secure computation often benefits from the use of correlated randomness to achieve fast, non-cryptog...
International audienceSecure multiparty computation (MPC) often relies on sources of correlated rand...
Secure multiparty computation can often utilize a trusted source of correlated randomness to achieve...
International audienceWe consider the problem of securely generating useful instances of two-party c...
Abstract We investigate the extent to which correlated secret random-ness can help in secure computa...
A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful sources o...
International audienceCorrelated secret randomness is a useful resource for many cryptographic appli...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
International audienceIn this work we introduce a new (circuit-dependent) homomorphic secret sharing...
Secure multiparty computation (MPC) addresses the challenge of evaluating functions on secret inputs...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
A family of hash functions is called “correlation intractable ” if it is hard to find, given a rando...
Many implementations of secure computation use fixed-key AES (modeled as a random permutation); this...
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high ...