TPMPC 2024
The 10. Theory and Practice of Multi-Party Computation Workshop (TPMPC'24) was organized by the ENCRYPTO group at TU Darmstadt, Germany and took place from Monday, June 3rd to Thursday, June 6th, 2024. There were 161 participants from 23 countries and 81 organizations. The program consisted of 12 invited talks, 25 contributed talks, a diversity panel, an industry exhibition, and a rump session.
Thanks to everyone who contributed to TPMPC'24 and made it such a great event! Also, thanks to our main sponsors - the European Research Council (ERC) Research Starting Grant PSOTI and the Deutsche Forschungsgemeinschaft (DFG) Collaborative Research Center CROSSING!
Next year’s TPMPC'25 will be organized by Arpita Patra's CrIS lab at IISc Bangalore, India.
Program
The program consists of talks by invited speakers as well as several contributed talks and a rump session. The final program is as follows.
Monday, 3 June 2024
08:00-08:45: -------------------------------------------REGISTRATION-------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
08:45-09:00: Opening Remarks. [slides] [video]
Thomas Schneider (TU Darmstadt)
09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Kasra Edalatnejad (TU Darmstadt)
09:00-09:50: Invited Talk - Distributed Discrete Logarithms and Applications, Part I. [slides] [video]
Pierre Meyer (Aarhus University)
09:50-10:40: Invited Talk - Distributed Discrete Logarithms and Applications, Part II. [slides] [video]
Lawrence Roy (Aarhus University)
10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
11:10-12:25: -------------------------------------------SESSION 2--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Phillipp Schoppmann (Google)
11:10-11:35: Advanced FHE and MPC Protocols for the Blockchain. [slides] [video]
Daniel Demmler (Zama)
11:35-12:00: Analysing Dutch public transport data with MPC. [slides] [video]
Meilof Veeningen (Roseman Labs)
12:00-12:25: Integrating Sharemind MPC into Carbyne Stack. [slides] [video]
Riivo Talviste (Cybernetica)
12:25-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------
Location: Clock-Tower Hall - building S2|08, room 171
Session chair: Divya Ravi (University of Amsterdam)
14:00-14:50: Invited Talk - Homomorphic Secret Sharing with Verifiable Evaluation. [slides] [video]
Aarushi Goel (NTT Research)
14:50-15:15: Scalable Multiparty Computation from Non-linear Secret Sharing. [slides] [video]
Mingyuan Wang (UC Berkley)
15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------
Location: Clock-Tower Hall - building S2|08, room 171
Session chair: Peihan Miao (Brown University)
15:45-16:35: Invited Talk - Achieving Asynchronous MPC with Linear Communication and Optimal Resilience. [slides] [video]
Yifan Song (Tsinghua University)
16:35-17:00: Perfect Asynchronous MPC with Linear Communication Overhead. [slides] [video]
Arpita Patra (Indian Institute of Science)
17:00 ----------------------------------------------------END OF THE DAY-----------------------------------------------
Tuesday, 4 June 2024
09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Berry Schoenmakers (TU Eindhoven)
09:00-09:50: Invited Talk - A Bigger Picture of Secure Multi-Party Computation. [slides] [video]
Marina Blanton (University of Buffalo)
09:50-10:15: Malicious Security for Sparse Private Histograms. [slides] [video]
Phillipp Schoppmann (Google)
10:15-10:40: Willow: Secure Aggregation with Asynchronous Clients. [slides] [video]
Phillipp Schoppmann (Google)
10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
11:10-12:25: -------------------------------------------SESSION 2: DIVERSITY EVENT-------------------------------
Location: Köhler Hall - building S1|03, room 283
Panelists: Ivan Damgård, Peihan Miao, Arpita Patra, Benny Pinkas, Thomas Schneider
Panel Moderator: Nora Khayata
12:25-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Peter Scholl (Aarhus University)
14:00-14:50: Invited Talk - Practical Secure Machine Learning. [slides] [video]
Divya Gupta (Microsoft Research, India)
14:50-15:15: Sigma: Secure GPT Inference with Function Secret Sharing. [slides] [video]
Neha Jawalkar (Indian Institute of Science)
15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Benny Pinkas (Aptos Labs and Bar Ilan University)
15:45-16:35: Invited Talk - Sharing without Showing: Building Secure Collaborative Systems by Co-designing Systems and Cryptography. [slides] [video]
Wenting Zheng (Carnegie Mellon University)
16:35-17:00: Revitalizing Privacy-Preserving Machine Learning: Introducing FANNG-MPC for Actively Secure MLaaS. [slides] [video]
Abdelrahaman Aly and Ajith Suresh (Technology Innovation Institute)
17:30-19:00 -------------------------------------------GUIDED TOUR TO MATHILDENHÖHE----------------------
Meet at 17:20 at Infopoint Mathildenhöhe (Olbrichweg 10, Darmstadt)
19:00 ----------------------------------------------------END OF THE DAY-----------------------------------------------
Wednesday, 5 June 2024
09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Nishat Koti (TU Darmstadt)
09:00-09:50: Invited Talk - On the round-complexity of secure multi-party computation. [slides] [video]
Michele Ciampi (University of Edinburgh)
09:50-10:15: Rational Secure Computation: New Definitions and Constructions. [slides] [video]
Siddharth Agarwal (Indian Institute of Science)
10:15-10:40: On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC. [slides] [video]
Jan Bobolz (University of Edinburgh)
10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
11:10-12:25: -------------------------------------------SESSION 2--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Ivan Damgård (Aarhus University)
11:10-12:00: Invited Talk - The Communication Complexity of Oblivious Transfer. [slides] [video]
Nico Döttling (CISPA)
12:00-12:25: Multipars: Reduced-Communication MPC over Z2k. [slides] [video]
Sebastian Hasler (University of Stuttgart)
12:25-12:35: -------------------------------------------GROUP PHOTO--------------------------------------------------
12:35-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Arpita Patra (Indian Institute of Science)
14:00-14:50: Invited Talk - On Broadcast and Identifiability in MPC. [slides] [video]
Divya Ravi (University of Amsterdam)
14:50-15:15: Distributed Randomness using Weighted VRFs. [slides] [video]
Benny Pinkas (Bar-Ilan University)
15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Thomas Schneider (TU Darmstadt)
15:45-16:10: Garbling gadgets and its applications to oblivious garbling. [slides] [video]
Rahul Satish (ITU Copenhagen)
16:10-16:35: Adaptive Distributional Security for Garbling Schemes with O(|x|) Online Complexity. [slides] [video]
Kirthivaasan Puniamurthy (Aalto University)
16:35-17:00:Threshold Garbled Circuits with Low Overhead. [slides] [video]
Schuyler Rosefield (Northeastern University)
17:00-17:45 -------------------------------------------INDUSTRY EVENT----------------------------------------------
Location: Clock-Tower Foyer - building S2|08, room 71
17:45-20:00 -------------------------------------------RUMP SESSION AND DINNER--------------------------------
(Rump session) Location: Köhler Hall - building S1|03, room 283
(Dinner) Location: Köhler Foyer - building S1|03, room 284
20:00 ----------------------------------------------------END OF THE DAY-----------------------------------------------
Thursday, 6 June 2024
09:00-10:40: -------------------------------------------SESSION 1--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Eysa Lee (Brown University)
09:00-09:50: Invited Talk - Computation Efficient Structure-Aware PSI from Incremental Function Secret Sharing. [slides] [video]
Peihan Miao (Brown University)
09:50-10:15: Optimizing Preprocessing for Maliciously Secure MPC: Faster Matrix Multiplications and Convolutions without Sacrifice. [slides] [video]
Marc Rivinius (University of Stuttgart)
10:15-10:40: Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs. [slides] [video]
Nikolas Melissaris (Aarhus University)
10:40-11:10: -------------------------------------------COFFEE BREAK-------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
11:10-12:25: -------------------------------------------SESSION 2--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Christian Weinert (Royal Holloway, University of London)
11:10-12:00: Invited Talk - Private Set Union (PSU). [slides] [video]
Ni Trieu (Arizona State University)
12:00-12:25: Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators. [slides] [video]
Amit Agarwal (University of Illinois Urbana-Champaign)
12:25-14:00: -------------------------------------------LUNCH BREAK--------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
14:00-15:15: -------------------------------------------SESSION 3--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Anders Dalskov (Partisia)
14:00-14:25: Asterisk: Super-fast MPC with a Friend. [slides] [video]
Protik Paul (Indian Institute of Science)
14:25-14:50: Preprocessing 4 Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer. [slides] [video]
Matan Hamilis (Reichman University)
14:50-15:15: Threshold ECDSA in Three Rounds. [slides] [video]
Yashvanth Kondi (Silence Laboratories)
15:15-15:45: -------------------------------------------COFFEE BREAK-------------------------------------------------
Location: Köhler Foyer - building S1|03, room 284
15:45-17:00: -------------------------------------------SESSION 4--------------------------------------------------------
Location: Köhler Hall - building S1|03, room 283
Session chair: Ajith Suresh (Technology Innovation Institute)
15:45-16:10: A lesson about the UC security of optimized MPC implementations. [slides] [video]
Peter Scholl (Aarhus University)
16:10-16:35: Malicious Security for SCALES - Outsourced Computation with Ephemeral Servers. [slides] [video]
Anasuya Acharya (Bar-Ilan University)
16:35-17:00: SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation. [slides] [video]
Robin William Hundt (Technical University of Darmstadt)
17:00-17:10 -------------------------------------------CLOSING REMARKS----------------------------------------------
Rump Session
We invite submissions for the rump session which is scheduled to take place on Wednesday, 05 June 2024 from 17:45.
You can submit rump session contributions via email to tpmpc2024-slides@encrypto.cs.tu-darmstadt.de with the email subject "[Rump Session Contribution] <Your talk title>". The deadline for the submission is Wednesday, 05 June 2024 12:00. Please also include the following details in your email.
Name of the presenter
Title of the presentation
Duration (no longer than 5 minutes)
Slides, if any, attached as PDF
Logistics
Venue:
Registration: Köhler Foyer - building S1|03, room 284, Hochschulstraße 1, 64289 Darmstadt
Talks: Köhler Hall - building S1|03, room 283, Hochschulstraße 1, 64289 Darmstadt
Catering: Köhler Foyer - building S1|03, room 284, Hochschulstraße 1, 64289 Darmstadt
For speakers:
All presentations will be given from a presentation laptop with a PDF viewer and Powerpoint provided centrally, which allows us to record the talks more easily and avoid switching between machines. Speakers are requested to send their slides as soon as they are ready to tpmpc2024-slides@encrypto.cs.tu-darmstadt.de.
About Darmstadt:
You can find more information about navigating Darmstadt here.
Welcome presentation: Link
Accepted contributed talks
Perfect Asynchronous MPC with Linear Communication Overhead. Ittai Abraham (Intel Labs), Gilad Asharov (Bar-Ilan University, Israel), Shravani Patil (Indian Institute of Science, Bangalore, India) and Arpita Patra (Indian Institute of Science, Bangalore, India).
Scalable Multiparty Computation from Non-linear Secret Sharing. Sanjam Garg (UC Berkeley), Abhishek Jain (NTT Research and Johns Hopkins University), Pratyay Mukherjee (Supra Research) and Mingyuan Wang (UC Berkeley).
Garbling gadgets and its applications to oblivious garbling. Tomer Ashur (3MI Labs, Belgium), Carmit Hazay (Bar-Ilan University, Israel) and Rahul Satish (IT University of Copenhagen, Denmark).
A lesson about the UC security of optimized MPC implementations. Alexander Kyster (Aarhus University), Frederik Huss Nielsen (Aarhus University), Sabine Oechsner (Vrije Universiteit Amsterdam) and Peter Scholl (Aarhus University).
Malicious Security for Sparse Private Histograms. Lennart Braun (Aarhus University), Adrià Gascón (Google), Mariana Raykova (Google), Phillipp Schoppmann (Google) and Karn Seth (Google).
Distributed Randomness using Weighted VRFs. Sourav Das (University of Illinois at Urbana Champaign), Benny Pinkas (Aptos Labs, Bar-Ilan University), Alin Tomescu (Aptos Labs) and Zhuolun Xiang (Aptos Labs).
Sigma: Secure GPT Inference with Function Secret Sharing. Kanav Gupta (University of Maryland, College Park), Neha Jawalkar (Indian Institute of Science), Ananta Mukherjee (Microsoft Research India), Nishanth Chandran (Microsoft Research India), Divya Gupta (Microsoft Research India), Ashish Panwar (Microsoft Research India) and Rahul Sharma (Microsoft Research India).
Threshold ECDSA in Three Rounds. Jack Doerner (Technion, Reichman University, Brown University), Yashvanth Kondi (Silence Labs), Eysa Lee (Brown University) and abhi shelat (Northeastern University).
Optimizing Preprocessing for Maliciously Secure MPC: Faster Matrix Multiplications and Convolutions without Sacrifice. Marc Rivinius (University of Stuttgart, Germany), Pascal Reisert (University of Stuttgart, Germany), Sebastian Hasler (University of Stuttgart, Germany), Toomas Krips (University of Tartu, Estonia) and Ralf Küsters (University of Stuttgart, Germany).
Preprocessing 4 Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer. Matan Hamilis (Reichman University), Ariel Nof (Bar-Ilan University), Elette Boyle (NTT Research and Reichman University), Yuval Ishai (Technion) and Niv Gilboa (Ben-Gurion University).
Adaptive Distributional Security for Garbling Schemes with O(|x|) Online Complexity. Estuardo Alpírez Bock (Xiphera, Finland), Sabine Oechsner (Vrije Universiteit Amsterdam), Chris Brzuska (Aalto University, Finland), Pihla Karanko (Aalto University, Finland) and Kirthivaasan Puniamurthy (Aalto University, Finland).
Revitalizing Privacy-Preserving Machine Learning: Introducing FANNG-MPC for Actively Secure MLaaS. Najwa Aaraj (Technology Innovation Institute), abdelrahaman aly (Technology Innovation Institute), Tim Güneysu (Ruhr-University Bochum), Chiara Marcolla (Technology Innovation Institute), Johannes Mono (Ruhr-University Bochum), Rogerio Paludo (Technology Innovation Institute), Iván Santos-González (Technology Innovation Institute), Mireia Scholz (Technology Innovation Institute), Eduardo Soria-Vazquez (Technology Innovation Institute), Victor Sucasas (Technology Innovation Institute) and Ajith Suresh (Technology Innovation Institute).
Asterisk: Super-fast MPC with a Friend. Banashri Karmakar (Indian Institute of Science, Bangalore), Nishat Koti (Technical University of Darmstadt, Germany), Arpita Patra (Indian Institute of Science, Bangalore), Sikhar Patranabis (IBM Research India), Protik Paul (Indian Institute of Science, Bangalore) and Divya Ravi (University of Amsterdam, Netherlands).
Threshold Garbled Circuits with Low Overhead. Schuyler Rosefield (Northeastern University), abhi shelat (Northeastern University) and LaKyah Tyner (Northeastern University).
Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators. Amit Agarwal (University of Illinois Urbana-Champaign), Elette Boyle (NTT Research and Reichman University), Niv Gilboa (Ben-Gurion University), Yuval Ishai (Technion), Mahimna Kelkar (Cornell Tech) and Yiping Ma (University of Pennsylvania).
Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs. Carsten Baum (Technical University of Denmark), Nikolas Melissaris (Aarhus University), Rahul Rachuri (Visa Research) and Peter Scholl (Aarhus University).
Multipars: Reduced-Communication MPC over Z2k. Sebastian Hasler (University of Stuttgart, Germany), Pascal Reisert (University of Stuttgart, Germany), Marc Rivinius (University of Stuttgart, Germany) and Ralf Küsters (University of Stuttgart, Germany).
On the Impossibility of Surviving (Iterated) Deletion of Weakly Dominated Strategies in Rational MPC. Johannes Blömer (Paderborn University), Jan Bobolz (University of Edinburgh) and Henrik Bröcher (Paderborn University).
Rational Secure Computation: New Definitions and Constructions. Siddharth Agarwal (Indian Institute of Science, Bengaluru), Chaya Ganesh (Indian Institute of Science, Bengaluru) and Bhavana Kanukurthi (Indian Institute of Science, Bengaluru).
Malicious Security for SCALES -- Outsourced Computation with Ephemeral Servers. Anasuya Acharya (Bar-Ilan University), Carmit Hazay (Bar-Ilan University), Vladimir Kolesnikov (Georgia Institute of Technology) and Manoj Prabhakaran (Indian Institute of Technology Bombay).
Integrating Sharemind MPC into Carbyne Stack. Sharemind team at Cybernetica AS.
SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation. Robin William Hundt (Technical University of Darmstadt, Germany), Nora Khayata (Technical University of Darmstadt, Germany), and Thomas Schneider (Technical University of Darmstadt, Germany).
Analysing Dutch public transport data with MPC. Meilof Veeningen (Roseman Labs).
Willow: Secure Aggregation with Asynchronous Clients. James Bell (Google), Adrià Gascón (Google), Baiyu Li (Google), Mariana Raykova (Google) and Phillipp Schoppmann (Google).
Advanced FHE and MPC Protocols for the Blockchain. Kelong Cong, Morten Dahl, Clément Danjou, Daniel Demmler, Tore Frederiksen, Petar Ivanov, Marc Joye, Benoît Libert, Dragos Rotaru, Nigel P. Smart*, Titouan Tanguy, Louis Tremblay Thibault (Zama, Paris, France; *imec-COSIC, KU Leuven, Leuven, Belgium).
Invited speakers
We are delighted to have talks from the following 12 confirmed invited speakers.
Talk title: A Bigger Picture of Secure Multi-Party Computation
Abstract: Secure multi-party computation is a mature area that enables computation over private data. Products utilizing secure computation techniques are now increasingly being built by tech companies for privacy-preserving data analytics and other purposes. For many years, progress in this area has focused on mechanisms for securely realizing different functionalities, i.e., on how to perform secure function evaluation. In this talk, we argue that other aspects of privacy-preserving computation deserve the attention of the research community. They include ensuring the trustworthiness of inputs to the computation, achieving security of linked computations, and selecting functions to ensure that the (authorized) information disclosure from the output is limited. We investigate the last component in more detail on the example of average salary computation, inspired by the Boston privacy-preserving gender pay gap study carried out in 2015-2017.
Bio: Marina Blanton is an Associate Professor in the Department of Computer Science and Engineering at the University at Buffalo (UB). She also serves as the Faculty Director of Women in Science and Engineering (WiSE) program at UB. Dr. Blanton received her MS in EECS from Ohio University in 2002, MS in CS from Purdue University in 2004, and PhD in CS from Purdue University in 2007. Her research interests are centrally in information security, privacy, and applied cryptography and recent projects span areas such as secure computation and outsourcing, integrity of outsourced computation and storage, and private biometric and genomic computation. Dr. Blanton has over 80 refereed publications, has served on the technical program committees of top conferences such as USENIX Security, IEEE S&P, and CCS, and is currently an associate editor of IEEE Transactions on Dependable and Secure Computing. She has received multiple awards for her research, including a 2013 AFOSR Young Investigator Award, the 2015 ACM CCS Test of Time Award, and a 2018 Google Faculty Research Award.
Talk title: On the round-complexity of secure multi-party computation
Abstract: In multi-party computation (MPC), multiple entities, each having some inputs want to jointly compute a function of these inputs with the guarantee that nothing aside from the output of the function will be leaked. In this talk, we are going to investigate how many messages the parties of an MPC need to exchange to securely realize any functionality with simulation-based security in the case where there is no setup and the majority of the parties can be corrupted. We will then consider a relaxation of the standard simulation-based paradigm, and show that this relaxation leads to more efficient MPC protocols that still realize non-trivial functionalities with meaningful security.
Bio: Michele Ciampi is a Chancellor’s Fellow (equivalent to Assistant Professor) at the School of Informatics at the University of Edinburgh. His work focuses on theoretical aspects of cryptography, including multi-party computation protocols, zero-knowledge proofs, and blockchain.
Talk title: The Communication Complexity of Oblivious Transfer
Abstract: Oblivious Transfer (OT) is the central primitive in the study of secure two-party computation; classical results in the area show that any secure two-party computation task can be realized from OT. However, until recently essentially all OT protocols (with very few exceptions) only achieved rate below 1/2. Here, the rate refers to the ratio between the communication size of the best insecure protocol and that of the protocol under consideration. The barrier at rate 1/2 is somewhat natural, as achieving OT with a rate above 1/2 implies highly desirable cryptographic concepts such as private information retrieval, which remain elusive from low-rate OT.
In this talk I will discuss a line of work which has led to communication-optimal OT protocols across a wide spectrum of assumptions and settings. Specifically, I will discuss the string-OT setting, the batch-OT setting as well as semi-honest security, statistical sender privacy and fully malicious security. A key concept pivotal to the development of communication-optimal OT is that of trapdoor hash functions, which have given rise to unexpected and compelling applications in their own right.
Bio: Nico Döttling is a tenured faculty at the Helmholtz Center for Information Security (CISPA) in Saarbrücken, where he leads a research group in the field of public-key cryptography and secure computation. After studying Computer Science at the Karlsruhe Institute of Technology (then Technical University of Karlsruhe), he finished his PhD in 2014 at the Karlsruhe Institute of Technology. His PhD thesis won the biennial Erika and Dr. Wolfgang Eichelberger Dissertation Award. After postdoctoral studies at Aarhus University and UC Berkeley, he joined Friedrich-Alexander-University Erlangen Nürnberg as an assistant professor in 2017 and CISPA as a tenure-track faculty in 2018. His research is currently supported by the European Union via an ERC Starting Grant for his project “Next-Generation Laconic Cryptography".
Talk title: Homomorphic Secret Sharing with Verifiable Evaluation
Abstract: A homomorphic secret sharing (HSS) scheme allows a client to delegate a computation to a group of untrusted servers while achieving input privacy as long as at least one server is honest. In recent years, many HSS schemes have been constructed that have, in turn, found numerous applications to cryptography.
Prior work on HSS focuses on the setting where the servers are semi-honest. In this work we lift HSS to the setting of malicious evaluators. We propose the notion of *HSS with verifiable evaluation* (ve-HSS) that guarantees correctness of output *even when all the servers are corrupted*. ve-HSS retains all the attractive features of HSS and adds the new feature of succinct (public) verification of output.
We present *black-box* constructions of ve-HSS by devising generic transformations for semi-honest HSS schemes (with negligible error). This provides a new non-interactive method for verifiable and private outsourcing of computation.
Bio: Aarushi Goel is a postdoctoral researcher in the Cryptography and Information Security Lab at NTT Research, mentored by Sanjam Garg. Previously, she was a Ph.D. student at Johns Hopkins University, where she was advised by Abhishek Jain. Her research interests span broadly across cryptography and related areas of security and theoretical computer science.
Talk title: Practical Secure Machine Learning
Abstract: With the rise of data silos, it is becoming increasingly important to enable private data collaboration, i.e., securely computing on data owned by different entities without any exchange or sharing of data in the clear. While theoretically, secure multiparty computation (MPC) enables this scenario with strong formal security guarantees, its general application suffers from many challenges, namely, performance, scalability and ease-of-use. In my talk, I will primarily focus on computations occurring in collaborative machine learning, namely, ML inference, training and validation. Over the last decade, the crypto and security communities have worked hard to address these challenges for secure machine learning. In fact, one of our recent works shows that secure inference has reached a tipping point: latency of secure inference for certain model classes matches that of cleartext. In another work, we improve the latency and scalability of secure transformer inference by more than an order of magnitude and enable secure inference of GPT-2 model in 1.6 seconds. My talk will discuss these recent developments, how we get there and what problems remain.
Bio: Divya Gupta is a Principal Researcher at Microsoft Research India. Her research interest is cryptography and its applications to security and privacy. Currently her work at MSR focusses on secure multiparty computation and blockchains, and in particular, making cryptography practical, usable, and performant. She has published several papers in top computer science conferences such as Crypto, Eurocrypt, IEEE S&P, ACM CCS, OSDI, and so on and holds 3 US Patents. Before joining MSR, she was a postdoc at UC Berkeley hosted by Sanjam Garg. She completed her PhD at University of California at Los Angeles with Amit Sahai. Her PhD dissertation was recognized by the Dissertation Fellowship and the Dimitris N. Chorafas Dissertation Award, given for outstanding work in engineering sciences, medicine and the natural sciences. She got her bachelors and masters degree in Computer Science and Engineering from Indian Institute of Technology, Delhi.
Talk title: Computation Efficient Structure-Aware PSI from Incremental Function Secret Sharing
Abstract: Structure-Aware Private Set Intersection (sa-PSI), recently introduced by Garimella et al. (Crypto'22), is a PSI variant where Alice's input set $S_A$ has a publicly known structure (for example, interval, ball or union of balls) and Bob's input $S_B$ is an unstructured set of elements. Prior work achieves sa-PSI where the communication cost only scales with the description size of $S_A$ instead of the set cardinality. However, the computation cost remains linear in the cardinality of $S_A$, which could be prohibitively large.
In this talk, we present a new semi-honest sa-PSI framework where both computation and communication costs only scale with the description size of $S_A$. Our main building block is a new primitive that we introduce called Incremental Boolean Function Secret Sharing (ibFSS), which is a generalization of FSS that additionally allows for evaluation on input prefixes. We formalize definitions and construct a weak ibFSS for a $d$-dimensional ball with $\ell_\infty$ norm, which may be of independent interest. Independently, we improve spatial hashing techniques (from prior work) when $S_A$ has structure union of $d$-dimensional balls in $(\{0,1\}^u)^d$, each of diameter $\delta$, from $\O(u \cdot d \cdot (\log \delta)^d)$ to $\O(\log \delta \cdot d)$ in terms of both computation and communication. Finally, we resolve several open questions from prior work, including handling a union of overlapping structures, enabling Bob to learn the intersection, and extending sa-PSI to functionalities like PSI-Cardinality and PSI-Sum of associated values.
Based on joint work with Gayathri Garimella and Benjamin Goff.
Bio: Peihan Miao is an assistant professor in the Department of Computer Science at Brown University. Her research interests lie broadly in cryptography, theory, and security, with a focus on secure multi-party computation. She received her PhD from the University of California, Berkeley in 2019. Before joining Brown, she had brief stints at the University of Illinois Chicago as an assistant professor and Visa Research as a staff research scientist. She is a recipient of a Meta Privacy Enhancing Technologies Award, Google Research Scholar Award, and Amazon Research Award.
Talk title: Distributed Discrete Logarithms and Applications, Part I / Part II
Abstract: In this two-parts talk we will introduce the "distributed discrete logarithm" problem (DDL) and present many of the exciting applications it has enabled in recent years. DDL is a crucial tool in recent share-conversion protocols and has enabled many exciting such as MPC with sub-linear complexity, homomorphic- and function secret-sharing, pseudorandom correlation generators, garbling, and more. We will give examples of DDL protocol from established assumptions, and dive into some of the applications.
Bio: Pierre Meyer is currently a Postdoc at Aarhus University, hosted by Claudio Orlandi. Previously, he completed his PhD at Reichman University and Université Paris Cité, advised by Elette Boyle and Geoffroy Couteau. His research mostly focuses on theoretical aspects of cryptography, and of MPC in particular.
Lawrence Roy is currently a postdoc at Aarhus University, Denmark. He completed his PhD at Oregon State University, advised by Mike Rosulek. His research interests include homomorphic secret sharing, oblivious transfer, and garbled circuits.
Talk title: On Broadcast and Identifiability in MPC
Abstract: Many existing deployments of Secure Multiparty Computation (MPC) protocols are susceptible to denial of service attacks unless they incorporate mechanisms to pinpoint cheating participants responsible for disruptions. However, identifying cheaters typically demands significant resources, which includes costly broadcast channels. Notably, use of broadcast is known to be necessary for unanimous identification of cheaters by all participants.
In this talk, we delve into the established correlations between the use of broadcast and identifiability within MPC protocols. Furthermore, we introduce a new notion of identifiability that does not require broadcast but nevertheless satisfies practical identifiability requirements. Specifically, this notion enables an honest party to provably identify an attacker to any external auditor, even when the protocol operates solely over point-to-point channels. Additionally, our identification mechanism distinguishes between unresponsive participants and those actively deviating from the protocol, facilitating handling of such qualitative distinctions at higher logic levels. Finally, we demonstrate the application of this notion to a new honest majority ECDSA signing protocol that supports cheater identification.
Bio: Divya is currently an Assistant Professor at the University of Amsterdam, Netherlands. Prior to this, she was a postdoctoral researcher at the Aarhus Crypto group and completed her PhD at Indian Institute of Science, India. Her primary research interests include feasibility and efficiency of tasks related to secure MPC under various adversarial and network models.
Talk title: Private Set Union (PSU)
Abstract: Private set intersection (PSI) and private set union (PSU) are two fundamental set operations with widespread applications in various privacy-sensitive contexts. Over the last decade, a substantial body of research has focused on PSI, whereas PSU has received relatively little attention. In this talk, I will review the existing literature on PSU protocols. Most recent PSU protocols have been tailored specifically for the two-party scenario, following the framework outlined by Kolesnikov et al. (Asiacrypt 2019) based on oblivious transfer (OT). Subsequently, I will present our new result on multi-party PSU (MPSU), enabling more than two parties to compute the union of their private datasets without revealing additional information. Our protocol avoids computationally expensive homomorphic operations or generic multi-party computation, thus providing an efficient solution for MPSU. It shows an improvement of up to $37.82\times$ in terms of running time and $389.85\times$ bandwidth cost compared to the existing state-of-the-art protocols.
Bio: Ni Trieu is currently an Assistant Professor at Arizona State University (ASU). Her research interests lie in the area of cryptography and security, with a specific focus on secure computation and its applications such as private set operation, secure bio-computing. Her work has been published in top-tier Cryptography & Security conferences. She received my Ph.D. degree from Oregon State University. Before joining ASU, she was a postdoctoral researcher at UC Berkeley.
Talk title: Achieving Asynchronous MPC with Linear Communication and Optimal Resilience
Abstract: Secure multiparty computation (MPC) allows a set of n parties to jointly compute a function over their private inputs. The seminal works of Ben-Or, Canetti and Goldreich [STOC '93] and Ben-Or, Kelmer and Rabin [PODC '94] settled the feasibility of MPC over asynchronous networks. Despite the significant line of work devoted to improving the communication complexity, current protocols with information-theoretic security and optimal resilience t<n/3 communicate \Omega(n^4C) field elements for a circuit with C multiplication gates. In contrast, synchronous MPC protocols with \Omega(nC) communication have long been known.
In this talk, I will introduce our recent progress that gives the first information-theoretic AMPC with communication complexity O(nC) field elements. Our construction is obtained from the following two results:
- We first build an asynchronous complete secret-sharing (ACSS) protocol with linear communication complexity. ACSS allows a dealer to share a batch of Shamir sharings such that all parties eventually receive their shares. ACSS is an important building block in AMPC. We improve the previously best-known result by Choudhury and Patra [J. Cryptol '23], which requires O(n^3) elements per sharing, by a factor of n^2.
- We then provide a novel MPC protocol that makes black-box use of ACSS, where the cost per multiplication reduces to the cost of distributing a constant number of sharings via ACSS, improving a linear factor over the state of the art by Choudhury and Patra [IEEE Trans. Inf. Theory '17].
Bio: Yifan Song is an assistant professor at Tsinghua University. He received the Ph.D. degree from Carnegie Mellon University in 2022, advised by Prof. Vipul Goyal. Before that, he received the Bachelor degree from Yao Class at Tsinghua University in 2017. Yifan Song is generally interested in theoretical Cryptography and has a special focus on secure multiparty computation. He has published more than 10 papers in the top conferences of Cryptography. He was a committee member of Eurocrypt 2023 and PKC 2024, and served as an external reviewer for many top conferences in Cryptography.
Talk title: Sharing without Showing: Building Secure Collaborative Systems by Co-designing Systems and Cryptography
Abstract: The recent revolution in advanced data analytics and machine learning have made it possible to extract unprecedented value from user data. However, this comes at the cost of user privacy in many application workflows. In this talk, I will discuss some ideas around building systems that enable privacy-preserving computation via a co-design of systems and cryptography. In the first part of the talk, I will present Bolt (IEEE S&P 2024), a new system for privacy-preserving two-party inference for a large language model like BERT using secure multiparty computation (MPC). With our system, a user can safely outsource prediction to a third party without revealing their sensitive data and or learning about the third party’s proprietary model parameters. In the second part, I will talk about building systems for democratizing cryptography. In Silph (IEEE S&P 2023), we develop a framework that can automatically compile a program written in a high-level language to an optimized, hybrid MPC protocol that mixes multiple MPC primitives securely and efficiently. This makes it possible for any programmer with no expertise in cryptography to create efficient MPC protocols from scratch.
Bio: Wenting Zheng is an assistant professor in the Computer Science Department at CMU. Her research interests are in computer systems, security, and applied cryptography. She aims to bridge the gap between theory and practice through a co-design of cryptography and systems. She does so by building practical cryptosystems with provable security guarantees, designing novel cryptographic primitives and protocols, and building systems for democratizing and accelerating cryptography. She is a recipient of NSF CAREER Award, Google Research Scholar Award, Distinguished Paper Award at IEEE Euro S&P, IBM PhD Fellowship, and Berkeley Fellowship. She obtained her Ph.D. in EECS from UC Berkeley.
Code of conduct
We want to make TPMPC a great experience for everyone! Therefore, we want to create a safe space where any form of discrimination or harassment – be it on the basis of your identity or age – will not be tolerated. Should anything happen that crosses your boundaries, you can always approach the organization team with any concern – either personally or via email.
Andreas Brueggemann, Nora Khayata, Thomas Schneider
Contact: https://encrypto.de/{lastname}
We assure that your concern will be treated confidentially.
Accommodation
We have negotiated special rates for TPMPC participants with the following two hotels in Darmstadt. We encourage you to reserve your rooms promptly to take advantage of these exclusive offers.
Maritim Hotel Darmstadt: Rooms are available at discounted rates if you book by 14 April 2024. Please mention the code TPMPC2024 when booking or use this link, which will take you directly to the booking at discounted rates. For bookings after 14 April 2024, the usual prices apply.
Hotel THE Darmstadt: To avail the special rates, guests should send an email to the hotel mentioning that they are a guest of TU Darmstadt. Otherwise, the normal prices apply when booking online.
Organization
Local Organizers
Thomas Schneider (Technical University of Darmstadt)
Nishat Koti (Technical University of Darmstadt)
Administrative Organization
Petra Fuhrmann (Technical University of Darmstadt): fuhrmann@encrypto.cs.tu-darmstadt.de)
Program Committee
Carsten Baum (Technical University of Denmark)
Ivan Damgård (Aarhus University)
Carmit Hazay (Bar-Ilan University)
Nishat Koti (Technical University of Darmstadt)
Arpita Patra (Indian Institute of Science Bangalore)
Mike Rosulek (Oregon State University)
Thomas Schneider (Technical University of Darmstadt)
Peter Scholl (Aarhus University)
Ajith Suresh (Technology Innovation Institute)
Christian Weinert (Royal Holloway University of London)
Steering Committee
Ivan Damgård (Aarhus University)
Carmit Hazay (Bar-Ilan University)
Claudio Orlandi (Aarhus University)
Arpita Patra (Indian Institute of Science Bangalore)
Mike Rosulek (Oregon State University)
Thomas Schneider (Technical University of Darmstadt)
Registration
Registration is open and can be done here. The deadline for registration is 12 May 2024, 11:59 PM (AoE). The dealine for registration has been extended till 19 May 2024.
For those requiring a visa invitation letter for travel, kindly send your request via email to tpmpc2024@encrypto.cs.tu-darmstadt.de with the following subject: "Visa invitation letter: <Your name>".
Call for contributed talks
Submission Deadline: Mon, February 26, 2024, 23:59 (AoE)
Notification: Fri, March 22, 2024
The 10th TPMPC Workshop seeks submissions for contributed talks in the area of the theory and/or practice of secure multiparty computation. The workshop does not have proceedings and hence, the submission can be based on either work in progress, papers in submission, or papers already published at a conference, workshop or journal. Areas of interest broadly include
Theoretical foundations of multiparty computation: feasibility, assumptions, asymptotic efficiency, etc.
Efficient MPC protocols for general or specific tasks of interest
Implementations, applications of, and tools for MPC
The TPMPC program committee will select talks with the aim of constructing a balanced program that will be of high interest to the audience.
Submission Details:
Contributed talks will be 20-30 minutes in-person talks in Darmstadt.
The submission deadline for contributed talks is on Monday, February 26, 2024 (anywhere on Earth).
Notification of acceptance can be expected by Friday, March 22, 2024.
Please submit by sending an email to tpmpc2024@encrypto.cs.tu-darmstadt.de with the subject "TPMPC Contributed Talk: <YOUR TALK TITLE>" with the following details:
Title
Authors and affiliations (also cc all contact authors on the email)
Speaker's name (who will register and give the presentation in person)
Speaker's position (e.g., PhD student, postdoc, ...)
Link to full paper (optional)
Published at (optional)
PDF containing a short summary (up to 2 pages excluding references, in LNCS format using \usepackage{fullpage}, need not be anonymized) of your proposed talk
Student stipends
We have a limited number of stipends to support students to attend the workshop. Preference will be given to students who have limited funding from other sources (e.g., from institutions without access to large travel funds).
The deadline for stipend applications is 04 April 2024.
Initial decisions will be made by 19 April 2024.
Requests can be made after 04 April 2024, but they will not be considered until the initial decisions are made.
To be considered for the stipend, the applicant should send an email to tpmpc2024@encrypto.cs.tu-darmstadt.de with the subject: "TPMPC student stipend application" containing the following details.
Name
Email ID
Status (Master's student/PhD student/Post doc/...)
Gender (F/M/D)
Affiliation
Country
Are you a contributed talk speaker?
An estimate of the expected funding for attending the workshop together with detailed breakdown of expenses excluding the registration fee but including costs such as travel expenses (by land/air), accommodation, etc.
A single PDF containing your CV, recent transcripts that corroborate the grades listed in the CV, and letter of motivation addressing why you should be funded
Please keep your supervisor in CC and ask them to confirm your application by email.
Applicants should note that the stipend may not be able to cover the entire attendance cost and that they may need to fund the remaining cost from other sources.