Elette Boyle

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Compressing unit-vector correlations via sparse pseudorandom generators2024-12-13Paper
On low-end obfuscation and learning2024-09-25Paper
Locally verifiable distributed SNARGs2024-08-01Paper
Information-theoretic distributed point functions2024-06-25Paper
scientific article; zbMATH DE number 7829259 (Why is no real title available?)
(available as arXiv preprint)
2024-04-09Paper
Breaking the O(√ n)-Bit Barrier
Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing
2024-03-26Paper
Arithmetic sketching
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Oblivious transfer with constant computational overhead
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Sublinear-communication secure multiparty computation does not require FHE
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Breaking the \(O(\sqrt{n})\)-bit barrier: Byzantine agreement with polylog bits per party
Journal of Cryptology
2023-11-21Paper
Correction to: ``Topology-hiding communication from minimal assumptions
Journal of Cryptology
2023-10-25Paper
Sublinear secure computation from new assumptions
Theory of Cryptography
2023-08-14Paper
Programmable distributed point functions
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Must the communication graph of MPC protocols be an expander?
Journal of Cryptology
2023-07-05Paper
Correlated pseudorandomness from expand-accumulate codes
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation2023-04-13Paper
Efficient fully secure computation via distributed zero-knowledge proofs2023-03-29Paper
Cryptography from Information Loss.2023-02-03Paper
Efficient pseudorandom correlation generators from ring-LPN2022-11-09Paper
Secure multiparty computation with sublinear preprocessing2022-08-30Paper
Adversarially robust property-preserving hash functions2022-07-18Paper
Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)]2022-05-18Paper
Sublinear GMW-style compiler for MPC with preprocessing2022-04-22Paper
Topology-hiding communication from minimal assumptions2022-03-23Paper
Function secret sharing for mixed-mode and fixed-point secure computation2021-12-08Paper
The bottleneck complexity of secure multiparty computation2021-07-28Paper
Foundations of homomorphic secret sharing2021-06-15Paper
Must the communication graph of MPC protocols be an expander?2020-06-30Paper
Limits of practical sublinear secure computation2020-06-30Paper
Permuted puzzles and cryptographic hardness2020-04-30Paper
Secure computation with preprocessing via function secret sharing2020-04-30Paper
Is information-theoretic topology-hiding computation possible?2020-04-30Paper
Zero-knowledge proofs on secret-shared data via fully linear PCPs2020-03-09Paper
Efficient pseudorandom correlation generators: silent OT extension and more2020-03-09Paper
Homomorphic secret sharing from lattices without FHE2020-02-06Paper
Securing Abe's mix-net against malicious verifiers via witness indistinguishability2018-10-17Paper
Exploring the boundaries of topology-hiding computation2018-07-17Paper
Recent advances in function and homomorphic secret sharing (invited talk)2018-04-26Paper
Can we access a database both locally and privately?2018-01-19Paper
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
Lecture Notes in Computer Science
2017-06-13Paper
Breaking the circuit size barrier for secure computation under DDH
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Is there an oblivious RAM lower bound?
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Oblivious parallel RAM and applications
Theory of Cryptography
2016-04-08Paper
Limits of extractability assumptions with distributional auxiliary input
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs
Lecture Notes in Computer Science
2015-12-10Paper
Function secret sharing
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Leakage-resilient coin tossing
Distributed Computing
2014-07-11Paper
Multiparty computation secure against continual memory leakage
Proceedings of the forty-fourth annual ACM symposium on Theory of computing
2014-05-13Paper
Functional signatures and pseudorandom functions
Public-Key Cryptography – PKC 2014
2014-03-25Paper
On extractability obfuscation
Theory of Cryptography
2014-02-18Paper
Secure computation against adaptive auxiliary information
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Fully leakage-resilient signatures
Journal of Cryptology
2013-08-01Paper
Communication Locality in Secure Multi-party Computation
Theory of Cryptography
2013-03-18Paper
Leakage-Resilient Coin Tossing
Lecture Notes in Computer Science
2011-10-28Paper
Fully Leakage-Resilient Signatures
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Sequential entry in many-to-one matching markets
Social Choice and Welfare
2009-10-19Paper


Research outcomes over time


This page was built for person: Elette Boyle