Preprints
- Practical Mempool Privacy via One-time Setup Batched Threshold Encryption
- Arka Rai Choudhuri, Sanjam Garg, Guru-Vamsi Policharla, and Mingyuan Wang
-
pdf blog
- Insta-Pok3r: Real-time Poker on Blockchain
- Sanjam Garg, Aniket Kate, Pratyay Mukherjee, Rohit Sinha, and Sriram Sridhar
- pdf
- Publicly Detectable Watermarking for Language Models
- Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Mingyuan Wang
- pdf
2024
- Scalable Multiparty Computation from Non-linear Secret Sharing
- Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, and Mingyuan Wang
- CRYPTO 2024 pdf
- Threshold Encryption with Silent Setup
- Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, and Mingyuan Wang
- CRYPTO 2024 pdf blog
- How to Prove Statements Obliviously?
- Sanjam Garg, Aarushi Goel, and Mingyuan Wang
- CRYPTO 2024 pdf
- Mempool Transaction Privacy via Batched Threshold Encryption: Attacks and Defenses
- Arka Rai Choudhuri, Sanjam Garg, Julien Piet, and Guru-Vamsi Policharla
- USENIX Security 2024 pdf blog
- SublonK: Sublinear Prover PlonK
- Arka Rai Choudhuri, Sanjam Garg, Aarushi Goel, Sruthi Sekar, and Rohit Sinha
- PoPETs 2024 pdf
- Laconic Branching Programs from the Diffie-Hellman Assumption
- Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, and Alice Murphy
- PKC 2024 pdf
- hinTS: Threshold Signatures with Silent Setup
- Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang
- IEEE S&P 2024 pdf
2023
- Experimenting with Zero-Knowledge Proofs of Training
- Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, and Mingyuan Wang
- CCS 2023 pdf blog
- Presented also at the RWC 2024.
- zkSaaS: Zero-Knowledge SNARKs as a Service
- Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, and Sruthi Sekar
- USENIX Security 2023 pdf
- Cryptography with Weights: MPC, Encryption and Signatures
- Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang
- CRYPTO 2023 pdf
- Correlation Intractability and SNARGs from Sub-exponential DDH
- Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, and Jiaheng Zhang
- CRYPTO 2023 pdf
- End-to-End Secure Messaging with Traceability Only for Illegal Content
- James Bartusek, Sanjam Garg, Abhishek Jain, and Guru-Vamsi Policharla
- EUROCRYPT 2023 pdf
- Credibility in Private Set Membership
- Sina Shiehian, Sanjam Garg, Omkant Pandey, Abhishek Jain, Mohammad Hajiabadi, and Zhengzhong Jin
- PKC 2023 pdf
- Threshold Signatures in the Multiverse
- Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang
- IEEE S&P 2023 pdf
2022
- Overparameterization from Computational Constraints
- Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Mingyuan Wang
- NeurIPS 2022 pdf
- IBE with Incompressible Master Secret and Small Identity Secrets
- Nico Döttling, Sanjam Garg, Sruthi Sekar, and Mingyuan Wang
- TCC 2022 pdf
- On the Worst-Case Inefficiency of CGKA
- Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, and Paul Rösler
- TCC 2022 pdf
- Succinct Zero Knowledge for Floating Point Computations
- Sanjam Garg, Abhishek Jain, Zhengzhong Jin, and Yinuo Zhang
- CCS 2022 pdf
- A More Complete Analysis of the Signal Double Ratchet Algorithm
- Alexander Bienstock, Jaiden Fairoze, Sanjam Garg, Pratyay Mukherjee, and Srinivasan Raghuraman
- CRYPTO 2022 pdf
- Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices
- Zvika Brakerski, Nico Döttling, Sanjam Garg, and Giulio Malavolta
- ICALP 2022 pdf
- Invited presentations at Matches Made in Heaven: Cryptography and Theoretical Computer Science Workshop and Simons Workshop on New Developments in Obfuscation
- Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning
- Ji Gao, Sanjam Garg, Mohammad Mahmoody, and Prashant Nalini Vasudevan
- PoPETs 2022 pdf
- An earlier version presented at Privacy Preserving Machine Learning workshop at NeurIPS 2020.
- Reusable Two-Round MPC from LPN
- James Bartusek, Sanjam Garg, Akshayaram Srinivasan, and Yinuo Zhang
- PKC 2022 pdf
2021
- A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks
- Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Abhradeep Thakurta
- NeurIPS 2021 pdf
- An earlier version presented at Uncertainty & Robustness in Deep Learning workshop at ICML 2020.
- Amortizing Rate-1 OT and Applications to PIR and PSI
- Melissa Chase, Sanjam Garg, Mohammad Hajiabadi, Jialin Li, and Peihan Miao
- TCC 2021 pdf
- Laconic Private Set Intersection and Applications
- Navid Alamati, Pedro Branco, Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, and Sihang Pu
- TCC 2021 pdf
- How to Generically Build a Trapdoor for an Encryption Scheme
- Sanjam Garg, Mohammad Hajiabadi, Giulio Malavolta, and Rafail Ostrovsky
- ASIACRYPT 2021 pdf
- Compact Ring Signatures from Learning With Errors
- Rohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey, and Sina Shiehian
- CRYPTO 2021 pdf
- NeuraCrypt is not private
- Nicholas Carlini, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Florian Tramer
- Manuscript pdf
- Presented at the 3rd Privacy-Preserving Machine Learning Workshop, CRYPTO 2021 and Privacy Preserving Machine Learning Workshop, CCS 2021.
- Is Private Learning Possible with Instance Encoding?
- Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta, and Florian Tramer
- IEEE S&P 2021 pdf
- An earlier version presented at Privacy Preserving Machine Learning workshop at NeurIPS 2020.
2020
- FHE-Based Bootstrapping of Designated-Prover NIZK
- Zvika Brakerski, Sanjam Garg, and Rotem Tsabary
- TCC 2020 pdf
- Constant-Ciphertext-Rate Non-Committing Encryption from Standard Assumptions
- Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, and Giulio Malavolta
- TCC 2020 pdf
- Reusable Two-Round MPC from DDH
- James Bartusek, Sanjam Garg, Daniel Masny, and Pratyay Mukherjee
- TCC 2020 pdf
- Efficient Range Trapdoor Functions and Applications: Rate-1 OT and More
- Sanjam Garg, Mohammad Hajiabadi, and Rafail Ostrovsky
- TCC 2020 pdf
- Black-Box Constructions of Bounded-Concurrent Secure Computation
- Sanjam Garg, Xiao Liang, Omkant Pandey, and Ivan Visconti
- SCN 2020 pdf
- Tight Verifiable Delay Functions
- Nico Döttling, Sanjam Garg, Giulio Malavolta, and Prashant Nalini Vasudevan
- SCN 2020 pdf
- Candidate iO From Homomorphic Encryption Schemes
- Zvika Brakerski, Nico Döttling, Sanjam Garg, and Giulio Malavolta
- EUROCRYPT 2020 pdf
- Invited to the Journal of Cryptology; top three papers accepted at the conference were invited
- Formalizing Data Deletion in the Context of the Right to be Forgotten
- Sanjam Garg, Shafi Goldwasser, and Prashant Vasudevan
- EUROCRYPT 2020 pdf
-
Presented also at the ICML 2020 workshop on Law and Machine Learning
- Two-round Oblivious Transfer from CDH and LPN
- Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, and Daniel Wichs
- EUROCRYPT 2020 pdf
- Master-Key KDM-Secure IBE from Pairings
- Sanjam Garg, Romain Gay, and Mohammad Hajiabadi
- PKC 2020 pdf
- Invited to the Journal of Cryptology
- Adversarially Robust Learning Could Leverage Computational Hardness
- Sanjam Garg, Somesh Jha, Saeed Mahloujifar, and Mohammad Mahmoody
- Algorithmic Learning Theory (ALT) 2020 pdf
- Also presented at Security and Privacy of Machine Learning workshop at ICML 2019, and
Safety and Robustness in Decision Making workshop at NeurIPS 2020.
- Separating Two-Round Secure Computation from Oblivious Transfer
- Zvika Brakerski, Benny Applebaum, Sanjam Garg, Yuval Ishai, and Akshayaram Srinivasan
- ITCS 2020 pdf
- Ad Hoc Multi-Input Functional Encryption
- Shweta Agarwal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O’Neill, and Justin Thaler
- ITCS 2020 pdf
2019
- Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
- Zvika Brakerski, Nico Döttling, Sanjam Garg, and Giulio Malavolta
- TCC 2019 pdf
- Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
- Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, and Giulio Malavolta
- Asiacrypt 2019 pdf
- The Broadcast Message Complexity of Secure Multiparty Computation
- Sanjam Garg, Aarushi Goel, and Abhishek Jain
- Asiacrypt 2019 [pdf]
- Laconic Conditional Disclosure of Secrets and Applications
- Nico Döttling, Sanjam Garg, Vipul Goyal, and Giulio Malavolta
- FOCS 2019 pdf
- Trapdoor Hash Functions and Their Applications
- Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, and Rafail Ostrovsky
- CRYPTO 2019 pdf
- New Techniques for Efficient Trapdoor Functions and Applications
- Sanjam Garg, Romain Gay, and Mohammad Hajiabadi
- EUROCRYPT 2019 pdf
- Registration-Based Encryption from Standard Assumptions
- Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, and Sruthi Sekar
- PKC 2019 pdf
2018
- Registration-Based Encryption: Removing Private-Key Generator from IBE
- Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, and Ahmadreza Rahimi
- TCC 2018 pdf
- A Simple Construction of iO for Turing Machines
- Sanjam Garg, and Akshayaram Srinivasan
- TCC 2018 pdf
- Two-Round MPC: Information Theoretic and Black-Box
- Sanjam Garg, Yuval Ishai, and Akshayaram Srinivasan
- TCC 2018 pdf
- Trapdoor Functions from the Computation Diffie-Hellman Assumption
- Sanjam Garg and Mohammad Hajiabadi
- CRYPTO 2018 pdf
- Adaptive Garbled RAM from Laconic Oblivious Transfer
- Sanjam Garg, Rafail Ostrovsky and Akshayaram Srinivasan
- CRYPTO 2018 pdf
- On the Round Complexity of OT Extension
- Sanjam Garg, Mohammad Mahmoody, Daniel Masny and Izaak Meckler
- CRYPTO 2018 pdf
- Limits on the Power of Garbling Techniques for Public-Key Encryption
- Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, and Ameer Mohammed
- CRYPTO 2018 pdf
- Two-Round Multiparty Secure Computation Minimizing Public Key Operations
- Sanjam Garg, Peihan Miao and Akshayaram Srinivasan
- CRYPTO 2018 pdf
- Two-Round Multiparty Secure Computation from Minimal Assumptions
- Sanjam Garg and Akshayaram Srinivasan
- EUROCRYPT 2018 pdf
- Winner of Best Paper Award
- Adaptively Secure Garbling with Near Optimal Online Complexity
- Sanjam Garg and Akshayaram Srinivasan
- EUROCRYPT 2018 pdf
- A New Approach to Black-Box Concurrent Secure Computation
- Sanjam Garg, Susumu Kiyoshima and Omkant Pandey
- EUROCRYPT 2018 pdf
- New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
- Nico Döttling, Sanjam Garg, Mohammad Hajiabadi and Daniel Masny
- PKC 2018 pdf
- Obfuscation from Low Noise Multilinear Maps
- Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao and Pratyay Mukherjee
- Indocrypt 2018 pdf
2017
- From Selective IBE to Full IBE and Selective HIBE
- Nico Döttling and Sanjam Garg
- TCC 2017 pdf
- When does Functional Encryption Imply Obfuscation?
- Sanjam Garg, Mohammad Mahmoody, and Ameer Mohammed
- TCC 2017 pdf
- Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
- Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, and Akshay Wadia
- ASIACRYPT 2017 pdf
- Garbled Protocols and Two Round MPC from Bilinear Maps
- Sanjam Garg and Akshayaram Srinivasan
- FOCS 2017 pdf
- Identity-Based Encryption from the Diffie-Hellman Assumption
- Nico Döttling and Sanjam Garg
- CRYPTO 2017 pdf
- Winner of Best Paper Award
- Lower Bounds on Obfuscation from All-or-Nothing Encryption Functionalities
- Sanjam Garg, Mohammad Mahmoody, and Ameer Mohammed
- CRYPTO 2017 pdf
- Laconic Oblivious Transfer and Its Applications
- Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao and Antigoni Polychroniadou
- CRYPTO 2017 pdf
- Incremental Program Obfuscation
- Sanjam Garg, and Omkant Pandey
- CRYPTO 2017 pdf
- Cryptanalysis of Indistinguishability Obfuscation of Circuits over GGH13
- Daniel Apon, Nico Döttling, Sanjam Garg, and Pratyay Mukherjee
- ICALP 2017 pdf
- On the Exact Round Complexity of Self-Composable Two-Party Computation
- Sanjam Garg, Susumu Kiyoshima and Omkant Pandey
- EUROCRYPT 2017 pdf
- Breaking the Sub-Exponential Barrier in Obfustopia
- Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan and Mark Zhandry
- EUROCRYPT 2017 pdf
2016
- Secure Obfuscation in a Weak Multilinear Map Model
- Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan and Mark Zhandry
- TCC 2016-B pdf
- Merger of GMS and MSZ
- Single-Key to Multi-Key Functional Encryption with Polynomial Loss
- Sanjam Garg and Akshayaram Srinivasan
- TCC 2016-B pdf
- Secure Multiparty RAM Computation in Constant Rounds
- Sanjam Garg, Divya Gupta, Peihan Miao and Omkant Pandey
- TCC 2016-B pdf
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
- Sanjam Garg, Omkant Pandey and Akshayaram Srinivasan
- CRYPTO 2016 pdf
- TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
- Sanjam Garg, Payman Mohassel and Charalampos Papamanthou
- CRYPTO 2016 pdf
- The Exact Round Complexity of Secure Computation
- Sanjam Garg, Pratyay Mukherjee, Omkant Pandey and Antigoni Polychroniadou
- EUROCRYPT 2016 pdf
- Fully Secure Functional Encryption without Obfuscation
- Sanjam Garg, Craig Gentry, Shai Halevi and Mark Zhandry
- TCC 2016-A pdf
2015
- Black-Box Garbled RAM
- Sanjam Garg, Steve Lu and Rafail Ostrovsky
- FOCS 2015 pdf
- Cryptography with One-Way Communication
- Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky and Amit Sahai
- CRYPTO 2015 pdf
- Garbled RAM from One-Way Functions
- Sanjam Garg, Steve Lu, Rafail Ostrovsky and Alessandra Scafuro
- STOC 2015 pdf
- Succinct Randomized Encodings and their Applications
- Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass and Sidharth Telang
- STOC 2015 pdf (a merger of pdf and pdf)
- Merged version invited to and published in the STOC special issue of SICOMP pdf
- Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
- Sanjam Garg and Antigoni Polychroniadou
- TCC 2015 pdf
2014
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Sanjam Garg, Craig Gentry, Shai Halevi and Daniel Wichs
- CRYPTO 2014 pdf
- Invited and published in a special issue of Algorithmica Journal dedicated to top CRYPTO 2014 papers pdf
- Protecting Obfuscation Against Algebraic Attacks
- Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth and Amit Sahai
- EUROCRYPT 2014 pdf
- Efficient Round Optimal Blind Signatures
- Sanjam Garg and Divya Gupta
- EUROCRYPT 2014 pdf
- Two-round secure MPC from Indistinguishability Obfuscation
- Sanjam Garg, Craig Gentry, Shai Halevi and Mariana Raykova
- TCC 2014 pdf
- Invited to the Journal of Cryptology
- Cross Domain Secure Computation
- Chongwon Cho, Sanjam Garg and Rafail Ostrovsky
- PKC 2014 [pdf]
- Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions
- Nishanth Chandran and Sanjam Garg
- Indocrypt 2014 pdf
- Fully Secure Attribute Based Encryption from Multilinear Maps
- Sanjam Garg, Craig Gentry, Shai Halevi and Mark Zhandry
- Manuscript 2014 pdf
2013
- Candidate Multilinear Maps
- Sanjam Garg
- PhD Thesis pdf
- Differing-Inputs Obfuscation and Applications
- Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai and Mark Zhandry
- Manuscript 2013 pdf
- Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
- Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai and Brent Waters
- FOCS 2013 pdf
- Invited and published for the FOCS special issue of SICOMP and CACM Research Highlights
- Attribute Based Encryption for Circuits from Multilinear Maps
- Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai and Brent Waters
- CRYPTO 2013 pdf
- Secure Computation Against Adaptive Auxiliary Information
- Elette Boyle, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai and Amit Sahai
- CRYPTO 2013 [pdf]
- Witness Encryption and its Applications
- Sanjam Garg, Craig Gentry, Amit Sahai and Brent Waters
- STOC 2013 pdf
- Candidate Multilinear Maps from Ideal Lattices
- Sanjam Garg, Craig Gentry and Shai Halevi
- EUROCRYPT 2013 pdf
- Winner of Best Paper Award
- Why “Fiat-Shamir for Proofs” Lacks a Proof
- Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana Lopez-Alt and Daniel Wichs
- TCC 2013
- Merger of BGW and DJKL
2012
- Adaptively Secure Multi-Party Computation with Dishonest Majority
- Sanjam Garg and Amit Sahai
- CRYPTO 2012 pdf
- Impossibility Results for Static Input Secure Computation
- Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky and Ivan Visconti
- CRYPTO 2012 pdf
- Concurrently Secure Computation in Constant Rounds
- Sanjam Garg, Vipul Goyal, Abhishek Jain and Amit Sahai
- EUROCRYPT 2012 pdf
- Resettable Statistical Zero Knowledge
- Sanjam Garg, Rafail Ostrovsky, Ivan Visconti and Akshay Wadia
- TCC 2012 pdf
2011
- Leakage-Resilient Zero Knowledge
- Sanjam Garg, Abhishek Jain and Amit Sahai
- CRYPTO 2011 pdf
- Round Optimal Blind Signatures
- Sanjam Garg, Vanishree Rao, Amit Sahai, Dominique Schröder and Dominique Unruh
- CRYPTO 2011 pdf
- Bringing People of Different Beliefs Together to do UC
- Sanjam Garg, Vipul Goyal, Abhishek Jain and Amit Sahai
- TCC 2011 pdf
2010
- Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
- Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai and Brent Waters
- CCS 2010 pdf
2008
- Improved bounds on security reductions for Discrete log based Signatures
- Sanjam Garg, Raghav Bhaskar and Satyanarayana V. Lokam
- CRYPTO 2008 pdf
- Anti-DDoS Virtualized Operation System
- Sanjam Garg and Huzur Saran
- ARES 2008
2007
- Unified Architecture for Large-Scale Attested Metering
- Michael LeMay, George Gross, Carl A. Gunter and Sanjam Garg
- HICSS 2007 pdf