Skip to main content

Showing 1–5 of 5 results for author: Boyle, E

.
  1. arXiv:2309.01466  [pdf, ps, other

    cs.CR cs.DC

    Communication Lower Bounds for Cryptographic Broadcast Protocols

    Authors: Erica Blum, Elette Boyle, Ran Cohen, Chen-Da Liu-Zhang

    Abstract: Broadcast protocols enable a set of $n$ parties to agree on the input of a designated sender, even facing attacks by malicious parties. In the honest-majority setting, randomization and cryptography were harnessed to achieve low-communication broadcast with sub-quadratic total communication and balanced sub-linear cost per party. However, comparatively little is known in the dishonest-majority set… ▽ More

    Submitted 4 September, 2023; originally announced September 2023.

    Comments: A preliminary version of this work appeared in DISC 2023

  2. Must the Communication Graph of MPC Protocols be an Expander?

    Authors: Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubáček

    Abstract: Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) Where a partial network is fixed a priori, and thus corruptions can occur dependent on its structure, and (2) Where edges in the communication graph are determined dynamically as part of the protocol. Whereas a rich literature has succeeded in mapping out the feasibility and lim… ▽ More

    Submitted 21 June, 2023; v1 submitted 19 May, 2023; originally announced May 2023.

    Journal ref: Journal of Cryptology 36, 20 (2023)

  3. arXiv:2201.03041  [pdf, ps, other

    cs.DS cs.CR

    Locality-Preserving Hashing for Shifts with Connections to Cryptography

    Authors: Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein

    Abstract: Can we sense our location in an unfamiliar environment by taking a sublinear-size sample of our surroundings? Can we efficiently encrypt a message that only someone physically close to us can decrypt? To solve this kind of problems, we introduce and study a new type of hash functions for finding shifts in sublinear time. A function $h:\{0,1\}^n\to \mathbb{Z}_n$ is a $(d,δ)$ {\em locality-preservin… ▽ More

    Submitted 9 January, 2022; originally announced January 2022.

    Journal ref: ITCS 2022

  4. arXiv:2012.14884  [pdf, other

    cs.CR

    Lightweight Techniques for Private Heavy Hitters

    Authors: Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai

    Abstract: This paper presents Poplar, a new system for solving the private heavy-hitters problem. In this problem, there are many clients and a small set of data-collection servers. Each client holds a private bitstring. The servers want to recover the set of all popular strings, without learning anything else about any client's string. A web-browser vendor, for instance, can use Poplar to figure out which… ▽ More

    Submitted 23 March, 2023; v1 submitted 29 December, 2020; originally announced December 2020.

    Comments: Appeared at IEEE Security & Privacy 2021

  5. arXiv:2002.02516  [pdf, ps, other

    cs.CR cs.DC

    Breaking the $O(\sqrt n)$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party

    Authors: Elette Boyle, Ran Cohen, Aarushi Goel

    Abstract: Byzantine agreement (BA), the task of $n$ parties to agree on one of their input bits in the face of malicious agents, is a powerful primitive that lies at the core of a vast range of distributed protocols. Interestingly, in protocols with the best overall communication, the demands of the parties are highly unbalanced: the amortized cost is $\tilde O(1)$ bits per party, but some parties must send… ▽ More

    Submitted 20 October, 2023; v1 submitted 6 February, 2020; originally announced February 2020.

    Comments: Preliminary version appeared in PODC'21; full version appeared in Journal of Cryptology 2023