Skip to main content

Utility navigation

  • Calendar
  • Contact
  • Login
  • MAKE A GIFT
Berkeley University of California
Home Home

Main navigation

  • Programs & Events
    • Research Programs
    • Workshops & Symposia
    • Public Lectures
    • Research Pods
    • Internal Program Activities
    • Algorithms, Society, and the Law
  • Participate
    • Apply to Participate
    • Propose a Program
    • Postdoctoral Research Fellowships
    • Law and Society Fellowships
    • Science Communicator in Residence Program
    • Circles
    • Breakthroughs Workshops and Goldwasser Exploratory Workshops
  • People
    • Scientific Leadership
    • Staff
    • Current Long-Term Visitors
    • Research Fellows
    • Postdoctoral Researchers
    • Scientific Advisory Board
    • Governance Board
    • Affiliated Faculty
    • Science Communicators in Residence
    • Law and Society Fellows
    • Chancellor's Professors
  • News & Videos
    • News
    • Videos
  • Support for the Institute
    • Annual Fund
    • All Funders
    • Institutional Partnerships
  • For Visitors
    • Visitor Guide
    • Plan Your Visit
    • Location & Directions
    • Accessibility
    • Building Access
    • IT Guide
  • About

Results 1491 - 1500 of 23856

News
|
Aug. 7, 2025

Letter from the Director, Summer 2025

Greetings from Berkeley, where we are in the final weeks of an exciting summer at the Simons Institute. Our Summer Cluster on Quantum Computing wound down a few weeks back after a period of intense activities. And our summer program on Cryptography has been continually abuzz with activity.

Workshop Talk
|
Aug. 6, 2025

Updatable Private Set Intersection

Private set intersection (PSI) enables two parties, each holding a private set of elements, to compute the intersection of their sets without revealing anything beyond the intersection. Updatable PSI (UPSI) extends this functionality, allowing the parties to compute PSI on a regular basis with sets that get updated over time. The goal is to support efficient PSI computations that scale with the size of the updates rather than the entire sets. In this talk, I will give an overview of recent developments in UPSI, including the main results, core techniques, ongoing efforts, and open problems.

Workshop Talk
|
Aug. 6, 2025

Distance-Aware OT with Application to Fuzzy PSI

A two-party fuzzy private set intersection (PSI) protocol between Alice and Bob with input sets allows Alice to learn nothing more than the points of Bob that are “close’’ to its points in some metric space. Fuzzy PSI is a valuable privacy tool in scenarios where PSI needs to be computed over imprecise or measurement-based data, such as GPS coordinates or healthcare data. Previous approaches to fuzzy PSI rely on asymmetric cryptographic primitives, generic two-party computation techniques like garbled circuits, or function secret sharing methods, all of which are computationally intensive and lead to poor concrete efficiency.

This talk introduces a new modular framework for semi-honest fuzzy PSI, primarily built on efficient symmetric key primitives. The core idea is to reduce the design of fuzzy PSI to a novel variant of oblivious transfer (OT), which we term distance-aware random OT (daOT). We propose efficient constructions for daOT based on standard OT techniques tailored for small domains, supporting distance metrics such as the Chebyshev norm, the Euclidean norm, and the Manhattan norm.

Workshop Talk
|
Aug. 6, 2025

PULSE: Parallel Private Set Union for Large-Scale Entities

Multi-party private set union (mPSU) allows multiple parties to compute the union of their private input sets without revealing any additional information. Existing efficient mPSU protocols can be categorized into symmetric key encryption (SKE)-based and public key encryption (PKE)-based approaches. However, neither type of mPSU protocol scales efficiently to a large number of parties, as they fail to fully utilize available computational resources, leaving participants idle during various stages of the protocol execution.

This talk highlights the limitations of existing protocols and introduces a unified framework for designing efficient mPSU protocols. I then present an efficient Parallel mPSU for Large-Scale Entities (PULSE) that enables parallel computation, allowing all parties/entities to perform computations without idle time, leading to significant efficiency improvements, particularly as the number of parties increases. Our PULSE is based on PKE and secure even when up to 𝑛 − 1 semi-honest parties are corrupted. We implemented PULSE and compared it to state-of-the-art mPSU protocols under different settings, showing a speedup of 1.91 to 3.57× for 𝑛 = 8 parties for various set sizes.

Workshop Talk
|
Aug. 6, 2025

The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs

This paper initiates a concrete-security treatment of two-party secure computation. The first step is to propose, as target, a simple, indistinguishability-based definition that we call InI. This could be considered a poor choice if it were weaker than standard simulation-based definitions, but it is not; we show that for functionalities satisfying a condition called invertibility, that we define and show is met by functionalities of practical interest like PSI and its variants, the two definitions are equivalent. Based on this, we move forward to study the concrete security of a canonical OPRF-based construction of PSI, giving a tight proof of InI security of the constructed PSI protocol based on the security of the OPRF. This leads us to the concrete security of OPRFs, where we show how different DH-style assumptions on the underlying group yield proofs of different degrees of tightness, including some that are tight, for the well-known and efficient 2H-DH OPRF, and thus for the corresponding DH PSI protocol. We then give a new PSI protocol, called salted-DH PSI, that is as efficient as DH-PSI, yet enjoys tighter proofs.

Workshop Talk
|
Aug. 6, 2025

Lower-Bounds on Public-Key Operations in PIR

We show that in any PIR (Private Information Retrieval) protocol without pre-processing, a server must perform a nearly linear number of public-key operations (in the size of the database), regardless of the number of symmetric-key operations. We will discuss the implications of this result for the communication complexity of oblivious transfer (OT) extension.

Workshop Talk
|
Aug. 6, 2025

Private information retrieval at 30: Achievements, disappointments, and open problems

Abstract not available.

Video
|
Aug. 6, 2025
New Techniques for Building Information-Theoretic Asynchronous MPC with Linear Communication
Video
|
Aug. 6, 2025
Recent Advances in Asynchronous Multi-Party Computation
Video
|
Aug. 6, 2025
On the Adaptive Security of Key-Unique Threshold Signatures

Pagination

  • Previous page Previous
  • Page 148
  • Page 149
  • Current page 150
  • Page 151
  • Page 152
  • Next page Next
Home
The Simons Institute for the Theory of Computing is the world's leading venue for collaborative research in theoretical computer science.

Footer

  • Programs & Events
  • Participate
  • Workshops & Symposia
  • Contact Us
  • Calendar
  • Accessibility

Footer social media

  • Twitter
  • Facebook
  • Youtube
© 2013–2026 Simons Institute for the Theory of Computing. All Rights Reserved.
link to homepage

Main navigation

  • Programs & Events
    • Research Programs
    • Workshops & Symposia
    • Public Lectures
    • Research Pods
    • Internal Program Activities
    • Algorithms, Society, and the Law
  • Participate
    • Apply to Participate
    • Propose a Program
    • Postdoctoral Research Fellowships
    • Law and Society Fellowships
    • Science Communicator in Residence Program
    • Circles
    • Breakthroughs Workshops and Goldwasser Exploratory Workshops
  • People
    • Scientific Leadership
    • Staff
    • Current Long-Term Visitors
    • Research Fellows
    • Postdoctoral Researchers
    • Scientific Advisory Board
    • Governance Board
    • Affiliated Faculty
    • Science Communicators in Residence
    • Law and Society Fellows
    • Chancellor's Professors
  • News & Videos
    • News
    • Videos
  • Support for the Institute
    • Annual Fund
    • All Funders
    • Institutional Partnerships
  • For Visitors
    • Visitor Guide
    • Plan Your Visit
    • Location & Directions
    • Accessibility
    • Building Access
    • IT Guide
  • About

Utility navigation

  • Calendar
  • Contact
  • Login
  • MAKE A GIFT
link to homepage