Elette Boyle

Orcid: 0009-0002-0360-8129

Affiliations:
  • IDC Herzliya, Herzliya, Israel


According to our database1, Elette Boyle authored at least 75 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Improved Constructions for Distributed Multi-Point Functions.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Non-Interactive Distributed Point Functions.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

The Complexity of Memory Checking with Covert Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Simultaneous-Message and Succinct Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Breaking the $O(\sqrt{n})$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party.
J. Cryptol., March, 2024

Memory Checking Requires Logarithmic Overhead.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Information-Theoretic Topology-Hiding Broadcast: Wheels, Stars, Friendship, and Beyond.
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024

Secure Sorting and Selection via Function Secret Sharing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Special Section on the Fifty-Ninth Annual IEEE Symposium on Foundations of Computer Science (2018).
SIAM J. Comput., December, 2023

Communication Lower Bounds for Cryptographic Broadcast Protocols.
Proceedings of the 37th International Symposium on Distributed Computing, 2023

Locally Verifiable Distributed SNARGs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

On Low-End Obfuscation and Learning.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

Sublinear-Communication Secure Multiparty Computation Does Not Require FHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Oblivious Transfer with Constant Computational Overhead.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Arithmetic Sketching.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Sublinear Secure Computation from New Assumptions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Locality-Preserving Hashing for Shifts with Connections to Cryptography.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Secure Multiparty Computation with Sublinear Preprocessing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Programmable Distributed Point Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Correlated Pseudorandomness from Expand-Accumulate Codes.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Information-Theoretic Distributed Point Functions.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
On the Security of Doubly Efficient PIR.
IACR Cryptol. ePrint Arch., 2021

Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Lightweight Techniques for Private Heavy Hitters.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Breaking the O(√ n)-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party.
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021

Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Sublinear GMW-Style Compiler for MPC with Preprocessing.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Low-Complexity Weak Pseudorandom Functions in $\mathtt {AC}0[\mathtt {MOD}2]$.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Succinctly Reconstructed Distributed Signatures and Balanced Byzantine Agreement.
IACR Cryptol. ePrint Arch., 2020

Topology-Hiding Communication from Minimal Assumptions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Cryptography from Information Loss.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

Correlated Pseudorandom Functions from Variable-Density LPN.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

Efficient Pseudorandom Correlation Generators from Ring-LPN.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.
IACR Cryptol. ePrint Arch., 2019

Permuted Puzzles and Cryptographic Hardness.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Secure Computation with Preprocessing via Function Secret Sharing.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Is Information-Theoretic Topology-Hiding Computation Possible?
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Adversarially Robust Property-Preserving Hash Functions.
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019

Homomorphic Secret Sharing from Lattices Without FHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Securing Abe's Mix-Net Against Malicious Verifiers via Witness Indistinguishability.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Foundations of Homomorphic Secret Sharing.
Proceedings of the 9th Innovations in Theoretical Computer Science Conference, 2018

The Bottleneck Complexity of Secure Multiparty Computation.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

Exploring the Boundaries of Topology-Hiding Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Limits of Practical Sublinear Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Must the Communication Graph of MPC Protocols be an Expander?
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Compressing Vector OLE.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Can We Access a Database Both Locally and Privately?
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Recent Advances in Function and Homomorphic Secret Sharing - (Invited Talk).
Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017

Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Homomorphic Secret Sharing: Optimizations and Applications.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Oblivious Parallel RAM and Applications.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Is There an Oblivious RAM Lower Bound?
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Breaking the Circuit Size Barrier for Secure Computation Under DDH.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Function Secret Sharing: Improvements and Extensions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Function Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Limits of Extractability Assumptions with Distributional Auxiliary Input.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Oblivious Parallel RAM.
IACR Cryptol. ePrint Arch., 2014

Large-Scale Secure Computation.
IACR Cryptol. ePrint Arch., 2014

On Extractability Obfuscation.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Functional Signatures and Pseudorandom Functions.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

2013
Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Secure Computation against Adaptive Auxiliary Information.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Multiparty computation secure against continual memory leakage.
Proceedings of the 44th Symposium on Theory of Computing Conference, 2012

2011
Leakage-Resilient Coin Tossing.
Proceedings of the Distributed Computing - 25th International Symposium, 2011

Fully Leakage-Resilient Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2009
Sequential entry in many-to-one matching markets.
Soc. Choice Welf., 2009


  Loading...