CryptoDB
Mayank Varia
Publications
Year
Venue
Title
2025
CIC
Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications
Abstract
<p>Asynchronous complete secret sharing (ACSS) is a foundational primitive in the design of distributed algorithms and cryptosystems that require confidentiality. ACSS permits a dealer to distribute a secret to a collection of N servers so that everyone holds shares of a polynomial containing the dealer's secret.</p><p>This work contributes a new ACSS protocol, called Haven++, that uses packing and batching to make asymptotic and concrete advances in the design and application of ACSS for large secrets. Haven++ allows the dealer to pack multiple secrets in a single sharing phase, and to reconstruct either one or all of them later. For even larger secrets, we contribute a batching technique to amortize the cost of proof generation and verification across multiple invocations of our protocol.</p><p>The result is an asymptotic improvement in the worst-case amortized communication and computation complexity, both for ACSS itself and for its application to asynchronous distributed key generation. Our ADKG based on Haven++ achieves, for the first time, an optimal worst case amortized communication complexity of κN without a trusted setup. To show the practicality of Haven++, we implement it and find that it outperforms the work of Yurek et al. (NDSS 2022) by more than an order of magnitude when there are malicious, faulty parties. </p>
2024
RWC
The Good, The Bad, and The Ugly — Lessons from an MPC for Social Good Deployment
Abstract
In Fall 2021, the president of Museums Moving Forward (MMF) approached us, cryptographers at Boston University, about using MPC to support one of their new projects. In this talk, we will share the story of the resulting deployment of MPC for social good. While our talk will cover the technical details of features we developed in the web-based JIFF framework in response to MMF’s needs, our primary focus will be the lessons that we learned about deploying MPC for social good throughout the process. Working collaboratively across disciplinary boundaries required developing shared language, bridging epistemological gaps, and designing new MPC features on the fly to recover from mistakes. Our goal is to uncover the messiness that usually gets suppressed in technical write-ups of cryptographic deployments. Understanding these pitfalls is critical for the continued growth of MPC and indispensable for cryptographers developing working relationships with non-technical stakeholder groups.
2022
CRYPTO
Universally Composable End-to-End Secure Messaging
📺
Abstract
We model and analyze the Signal end-to-end messaging protocol within the UC framework. In particular:
- We formulate an ideal functionality that captures end-to-end secure messaging, in a setting with PKI and an untrusted server, against an adversary that has full control over the network and can adaptively and momentarily compromise parties at any time and obtain their entire internal states. In particular our analysis captures the forward secrecy and recovery-of-security properties of Signal and the conditions under which they break.
- We model the main components of the Signal architecture (PKI and long-term keys, the backbone continuous-key-exchange or "asymmetric ratchet," epoch-level symmetric ratchets, authenticated encryption) as individual ideal functionalities that are realized and analyzed separately and then composed using the UC and Global-State UC theorems.
- We show how the ideal functionalities representing these components can be realized using standard cryptographic primitives under minimal hardness assumptions.
Our modeling introduces additional innovations that enable arguing about the security of Signal irrespective of the underlying communication medium, as well as secure composition of dynamically generated modules that share state. These features, together with the basic modularity of the UC framework, will hopefully facilitate the use of both Signal-as-a-whole and its individual components within cryptographic applications.
Two other features of our modeling are the treatment of fully adaptive corruptions, and making minimal use of random oracle abstractions. In particular, we show how to realize continuous key exchange in the plain model, while preserving security against adaptive corruptions.
2021
PKC
Two-server Distributed ORAM with Sublinear Computation and Constant Rounds
📺
Abstract
Distributed ORAM (DORAM) is a multi-server variant of Oblivious RAM. Originally proposed to lower bandwidth, DORAM has recently been of great interest due to its applicability to secure computation in the RAM model, where the circuit complexity and rounds of communication are equally important metrics of efficiency. All prior DORAM constructions either involve linear work per server (e.g., Floram) or logarithmic rounds of communication between servers (e.g., square root ORAM). In this work, we construct the first DORAM schemes in the 2-server, semi-honest setting that simultaneously achieve sublinear server computation and constant rounds of communication. We provide two constant-round constructions, one based on square root ORAM that has O(sqrt{N} log N) local computation and another based on secure computation of a doubly efficient PIR that achieves local computation of O(N^e) for any e > 0 but that allows the servers to distinguish between reads and writes. As a building block in the latter construction, we provide secure computation protocols for evaluation and interpolation of multi- variate polynomials based on the Fast Fourier Transform, which may be of independent interest.
2021
RWC
Protecting Cryptography against Self-Incrimination
Abstract
This talk explores a small yet crucial part of the U.S. Fifth Amendment privilege against self-incrimination called the "foregone conclusion doctrine." This doctrine concerns a new chapter of the Crypto Wars, in which the government issues subpoenas that compel people to decrypt their own devices, under the penalty of contempt of court if they do not comply. This talk will survey the use of compelled decryption by courts, provide a legal and technical description of the doctrine, and use a simulation-based definition to analyze the compellability of various cryptographic systems.
Service
- Crypto 2022 Program committee
Coauthors
- Kinan Dak Albab (1)
- Nicolas Alhaddad (1)
- Jen Benoit-Bryan (1)
- Ran Canetti (4)
- Ariel Hamlin (1)
- Gene Itkis (1)
- Palak Jain (1)
- Yael Tauman Kalai (1)
- Gabriel Kaptchuk (1)
- Mia Locks (1)
- Guy N. Rothblum (1)
- Sarah Scheffler (1)
- Emily Shen (1)
- Marika Swanberg (1)
- Mayank Varia (9)
- Daniel Wichs (1)
- David Wilson (1)
- Ziling Yang (1)
- Arkady Yerukhimovich (1)