publications

Preprints

Threshold Encryption with Silent Setup
Sanjam Garg, Dimitris Kolonelos, Guru-Vamsi Policharla, and Mingyuan Wang
pdf
Publicly Detectable Watermarking for Language Models
Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Mingyuan Wang
pdf
How to Prove Statements Obliviously?
Sanjam Garg, Aarushi Goel, and Mingyuan Wang
pdf

2024

Mempool Transaction Privacy via Batched Threshold Encryption: Attacks and Defenses
Arka Rai Choudhuri, Sanjam Garg, Julien Piet, and Guru-Vamsi Policharla
USENIX Security 2024 pdf
SublonK: Sublinear Prover PlonK
Arka Rai Choudhuri, Sanjam Garg, Aarushi Goel, Sruthi Sekar, and Rohit Sinha
PoPETs 2024 pdf
Laconic Branching Programs from the Diffie-Hellman Assumption
Sanjam Garg, Mohammad Hajiabadi, Peihan Miao, and Alice Murphy
PKC 2024 pdf
hinTS: Threshold Signatures with Silent Setup
Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang
IEEE S&P 2024 pdf

2023

Experimenting with Zero-Knowledge Proofs of Training
Sanjam Garg, Aarushi Goel, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Guru-Vamsi Policharla, and Mingyuan Wang
CCS 2023 pdf
Presented also at the RWC 2024.
zkSaaS: Zero-Knowledge SNARKs as a Service
Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, and Sruthi Sekar
USENIX Security 2023 pdf
Cryptography with Weights: MPC, Encryption and Signatures
Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang
CRYPTO 2023 pdf
Correlation Intractability and SNARGs from Sub-exponential DDH
Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, and Jiaheng Zhang
CRYPTO 2023 pdf
End-to-End Secure Messaging with Traceability Only for Illegal Content
James Bartusek, Sanjam Garg, Abhishek Jain, and Guru-Vamsi Policharla
EUROCRYPT 2023 pdf
Credibility in Private Set Membership
Sina Shiehian, Sanjam Garg, Omkant Pandey, Abhishek Jain, Mohammad Hajiabadi, and Zhengzhong Jin
PKC 2023 pdf
Threshold Signatures in the Multiverse
Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, and Yinuo Zhang
IEEE S&P 2023 pdf

2022

Overparameterization from Computational Constraints
Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Mingyuan Wang
NeurIPS 2022 pdf
IBE with Incompressible Master Secret and Small Identity Secrets
Nico Döttling, Sanjam Garg, Sruthi Sekar, and Mingyuan Wang
TCC 2022 pdf
On the Worst-Case Inefficiency of CGKA
Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, and Paul Rösler
TCC 2022 pdf
Succinct Zero Knowledge for Floating Point Computations
Sanjam Garg, Abhishek Jain, Zhengzhong Jin, and Yinuo Zhang
CCS 2022 pdf
A More Complete Analysis of the Signal Double Ratchet Algorithm
Alexander Bienstock, Jaiden Fairoze, Sanjam Garg, Pratyay Mukherjee, and Srinivasan Raghuraman
CRYPTO 2022 pdf
Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices
Zvika Brakerski, Nico Döttling, Sanjam Garg, and Giulio Malavolta
ICALP 2022 pdf
Invited presentations at Matches Made in Heaven: Cryptography and Theoretical Computer Science Workshop and Simons Workshop on New Developments in Obfuscation
Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning
Ji Gao, Sanjam Garg, Mohammad Mahmoody, and Prashant Nalini Vasudevan
PoPETs 2022 pdf
An earlier version presented at Privacy Preserving Machine Learning workshop at NeurIPS 2020.
Reusable Two-Round MPC from LPN
James Bartusek, Sanjam Garg, Akshayaram Srinivasan, and Yinuo Zhang
PKC 2022 pdf

2021

A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks
Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Abhradeep Thakurta
NeurIPS 2021 pdf
An earlier version presented at Uncertainty & Robustness in Deep Learning workshop at ICML 2020.
Amortizing Rate-1 OT and Applications to PIR and PSI
Melissa Chase, Sanjam Garg, Mohammad Hajiabadi, Jialin Li, and Peihan Miao
TCC 2021 pdf
Laconic Private Set Intersection and Applications
Navid Alamati, Pedro Branco, Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, and Sihang Pu
TCC 2021 pdf
How to Generically Build a Trapdoor for an Encryption Scheme
Sanjam Garg, Mohammad Hajiabadi, Giulio Malavolta, and Rafail Ostrovsky
ASIACRYPT 2021 pdf
Compact Ring Signatures from Learning With Errors
Rohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey, and Sina Shiehian
CRYPTO 2021 pdf
NeuraCrypt is not private
Nicholas Carlini, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Florian Tramer
Manuscript pdf
Presented at the 3rd Privacy-Preserving Machine Learning Workshop, CRYPTO 2021 and Privacy Preserving Machine Learning Workshop, CCS 2021.
Is Private Learning Possible with Instance Encoding?
Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta, and Florian Tramer
IEEE S&P 2021 pdf
An earlier version presented at Privacy Preserving Machine Learning workshop at NeurIPS 2020.

2020

FHE-Based Bootstrapping of Designated-Prover NIZK
Zvika Brakerski, Sanjam Garg, and Rotem Tsabary
TCC 2020 pdf
Constant-Ciphertext-Rate Non-Committing Encryption from Standard Assumptions
Zvika Brakerski, Pedro Branco, Nico Döttling, Sanjam Garg, and Giulio Malavolta
TCC 2020 pdf
Reusable Two-Round MPC from DDH
James Bartusek, Sanjam Garg, Daniel Masny, and Pratyay Mukherjee
TCC 2020 pdf
Efficient Range Trapdoor Functions and Applications: Rate-1 OT and More
Sanjam Garg, Mohammad Hajiabadi, and Rafail Ostrovsky
TCC 2020 pdf
Black-Box Constructions of Bounded-Concurrent Secure Computation
Sanjam Garg, Xiao Liang, Omkant Pandey, and Ivan Visconti
SCN 2020 pdf
Tight Verifiable Delay Functions
Nico Döttling, Sanjam Garg, Giulio Malavolta, and Prashant Nalini Vasudevan
SCN 2020 pdf
Candidate iO From Homomorphic Encryption Schemes
Zvika Brakerski, Nico Döttling, Sanjam Garg, and Giulio Malavolta
EUROCRYPT 2020 pdf
Invited to the Journal of Cryptology; top three papers accepted at the conference were invited
Formalizing Data Deletion in the Context of the Right to be Forgotten
Sanjam Garg, Shafi Goldwasser, and Prashant Vasudevan
EUROCRYPT 2020 pdf
Presented also at the ICML 2020 workshop on Law and Machine Learning
Two-round Oblivious Transfer from CDH and LPN
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, and Daniel Wichs
EUROCRYPT 2020 pdf
Master-Key KDM-Secure IBE from Pairings
Sanjam Garg, Romain Gay, and Mohammad Hajiabadi
PKC 2020 pdf
Invited to the Journal of Cryptology
Adversarially Robust Learning Could Leverage Computational Hardness
Sanjam Garg, Somesh Jha, Saeed Mahloujifar, and Mohammad Mahmoody
Algorithmic Learning Theory (ALT) 2020 pdf
Also presented at Security and Privacy of Machine Learning workshop at ICML 2019, and Safety and Robustness in Decision Making workshop at NeurIPS 2020.
Separating Two-Round Secure Computation from Oblivious Transfer
Zvika Brakerski, Benny Applebaum, Sanjam Garg, Yuval Ishai, and Akshayaram Srinivasan
ITCS 2020 pdf
Ad Hoc Multi-Input Functional Encryption
Shweta Agarwal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O’Neill, and Justin Thaler
ITCS 2020 pdf

2019

Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
Zvika Brakerski, Nico Döttling, Sanjam Garg, and Giulio Malavolta
TCC 2019 pdf
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Kevin Liu, and Giulio Malavolta
Asiacrypt 2019 pdf
The Broadcast Message Complexity of Secure Multiparty Computation
Sanjam Garg, Aarushi Goel, and Abhishek Jain
Asiacrypt 2019 [pdf]
Laconic Conditional Disclosure of Secrets and Applications
Nico Döttling, Sanjam Garg, Vipul Goyal, and Giulio Malavolta
FOCS 2019 pdf
Trapdoor Hash Functions and Their Applications
Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, and Rafail Ostrovsky
CRYPTO 2019 pdf
New Techniques for Efficient Trapdoor Functions and Applications
Sanjam Garg, Romain Gay, and Mohammad Hajiabadi
EUROCRYPT 2019 pdf
Registration-Based Encryption from Standard Assumptions
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi, and Sruthi Sekar
PKC 2019 pdf

2018

Registration-Based Encryption: Removing Private-Key Generator from IBE
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, and Ahmadreza Rahimi
TCC 2018 pdf
A Simple Construction of iO for Turing Machines
Sanjam Garg, and Akshayaram Srinivasan
TCC 2018 pdf
Two-Round MPC: Information Theoretic and Black-Box
Sanjam Garg, Yuval Ishai, and Akshayaram Srinivasan
TCC 2018 pdf
Trapdoor Functions from the Computation Diffie-Hellman Assumption
Sanjam Garg and Mohammad Hajiabadi
CRYPTO 2018 pdf
Adaptive Garbled RAM from Laconic Oblivious Transfer
Sanjam Garg, Rafail Ostrovsky and Akshayaram Srinivasan
CRYPTO 2018 pdf
On the Round Complexity of OT Extension
Sanjam Garg, Mohammad Mahmoody, Daniel Masny and Izaak Meckler
CRYPTO 2018 pdf
Limits on the Power of Garbling Techniques for Public-Key Encryption
Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, and Ameer Mohammed
CRYPTO 2018 pdf
Two-Round Multiparty Secure Computation Minimizing Public Key Operations
Sanjam Garg, Peihan Miao and Akshayaram Srinivasan
CRYPTO 2018 pdf
Two-Round Multiparty Secure Computation from Minimal Assumptions
Sanjam Garg and Akshayaram Srinivasan
EUROCRYPT 2018 pdf
Winner of Best Paper Award
Adaptively Secure Garbling with Near Optimal Online Complexity
Sanjam Garg and Akshayaram Srinivasan
EUROCRYPT 2018 pdf
A New Approach to Black-Box Concurrent Secure Computation
Sanjam Garg, Susumu Kiyoshima and Omkant Pandey
EUROCRYPT 2018 pdf
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi and Daniel Masny
PKC 2018 pdf
Obfuscation from Low Noise Multilinear Maps
Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao and Pratyay Mukherjee
Indocrypt 2018 pdf

2017

From Selective IBE to Full IBE and Selective HIBE
Nico Döttling and Sanjam Garg
TCC 2017 pdf
When does Functional Encryption Imply Obfuscation?
Sanjam Garg, Mohammad Mahmoody, and Ameer Mohammed
TCC 2017 pdf
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, and Akshay Wadia
ASIACRYPT 2017 pdf
Garbled Protocols and Two Round MPC from Bilinear Maps
Sanjam Garg and Akshayaram Srinivasan
FOCS 2017 pdf
Identity-Based Encryption from the Diffie-Hellman Assumption
Nico Döttling and Sanjam Garg
CRYPTO 2017 pdf
Winner of Best Paper Award
Lower Bounds on Obfuscation from All-or-Nothing Encryption Functionalities
Sanjam Garg, Mohammad Mahmoody, and Ameer Mohammed
CRYPTO 2017 pdf
Laconic Oblivious Transfer and Its Applications
Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao and Antigoni Polychroniadou
CRYPTO 2017 pdf
Incremental Program Obfuscation
Sanjam Garg, and Omkant Pandey
CRYPTO 2017 pdf
Cryptanalysis of Indistinguishability Obfuscation of Circuits over GGH13
Daniel Apon, Nico Döttling, Sanjam Garg, and Pratyay Mukherjee
ICALP 2017 pdf
On the Exact Round Complexity of Self-Composable Two-Party Computation
Sanjam Garg, Susumu Kiyoshima and Omkant Pandey
EUROCRYPT 2017 pdf
Breaking the Sub-Exponential Barrier in Obfustopia
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan and Mark Zhandry
EUROCRYPT 2017 pdf

2016

Secure Obfuscation in a Weak Multilinear Map Model
Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan and Mark Zhandry
TCC 2016-B pdf
Merger of GMS and MSZ
Single-Key to Multi-Key Functional Encryption with Polynomial Loss
Sanjam Garg and Akshayaram Srinivasan
TCC 2016-B pdf
Secure Multiparty RAM Computation in Constant Rounds
Sanjam Garg, Divya Gupta, Peihan Miao and Omkant Pandey
TCC 2016-B pdf
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
Sanjam Garg, Omkant Pandey and Akshayaram Srinivasan
CRYPTO 2016 pdf
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
Sanjam Garg, Payman Mohassel and Charalampos Papamanthou
CRYPTO 2016 pdf
The Exact Round Complexity of Secure Computation
Sanjam Garg, Pratyay Mukherjee, Omkant Pandey and Antigoni Polychroniadou
EUROCRYPT 2016 pdf
Fully Secure Functional Encryption without Obfuscation
Sanjam Garg, Craig Gentry, Shai Halevi and Mark Zhandry
TCC 2016-A pdf

2015

Black-Box Garbled RAM
Sanjam Garg, Steve Lu and Rafail Ostrovsky
FOCS 2015 pdf
Cryptography with One-Way Communication
Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky and Amit Sahai
CRYPTO 2015 pdf
Garbled RAM from One-Way Functions
Sanjam Garg, Steve Lu, Rafail Ostrovsky and Alessandra Scafuro
STOC 2015 pdf
Succinct Randomized Encodings and their Applications
Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass and Sidharth Telang
STOC 2015 pdf (a merger of pdf and pdf)
Merged version invited to and published in the STOC special issue of SICOMP pdf
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
Sanjam Garg and Antigoni Polychroniadou
TCC 2015 pdf

2014

On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
Sanjam Garg, Craig Gentry, Shai Halevi and Daniel Wichs
CRYPTO 2014 pdf
Invited and published in a special issue of Algorithmica Journal dedicated to top CRYPTO 2014 papers pdf
Protecting Obfuscation Against Algebraic Attacks
Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth and Amit Sahai
EUROCRYPT 2014 pdf
Efficient Round Optimal Blind Signatures
Sanjam Garg and Divya Gupta
EUROCRYPT 2014 pdf
Two-round secure MPC from Indistinguishability Obfuscation
Sanjam Garg, Craig Gentry, Shai Halevi and Mariana Raykova
TCC 2014 pdf
Invited to the Journal of Cryptology
Cross Domain Secure Computation
Chongwon Cho, Sanjam Garg and Rafail Ostrovsky
PKC 2014 [pdf]
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions
Nishanth Chandran and Sanjam Garg
Indocrypt 2014 pdf
Fully Secure Attribute Based Encryption from Multilinear Maps
Sanjam Garg, Craig Gentry, Shai Halevi and Mark Zhandry
Manuscript 2014 pdf

2013

Candidate Multilinear Maps
Sanjam Garg
PhD Thesis pdf
Differing-Inputs Obfuscation and Applications
Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai and Mark Zhandry
Manuscript 2013 pdf
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai and Brent Waters
FOCS 2013 pdf
Invited and published for the FOCS special issue of SICOMP and CACM Research Highlights
Attribute Based Encryption for Circuits from Multilinear Maps
Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai and Brent Waters
CRYPTO 2013 pdf
Secure Computation Against Adaptive Auxiliary Information
Elette Boyle, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai and Amit Sahai
CRYPTO 2013 [pdf]
Witness Encryption and its Applications
Sanjam Garg, Craig Gentry, Amit Sahai and Brent Waters
STOC 2013 pdf
Candidate Multilinear Maps from Ideal Lattices
Sanjam Garg, Craig Gentry and Shai Halevi
EUROCRYPT 2013 pdf
Winner of Best Paper Award
Why “Fiat-Shamir for Proofs” Lacks a Proof
Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana Lopez-Alt and Daniel Wichs
TCC 2013
Merger of BGW and DJKL

2012

Adaptively Secure Multi-Party Computation with Dishonest Majority
Sanjam Garg and Amit Sahai
CRYPTO 2012 pdf
Impossibility Results for Static Input Secure Computation
Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky and Ivan Visconti
CRYPTO 2012 pdf
Concurrently Secure Computation in Constant Rounds
Sanjam Garg, Vipul Goyal, Abhishek Jain and Amit Sahai
EUROCRYPT 2012 pdf
Resettable Statistical Zero Knowledge
Sanjam Garg, Rafail Ostrovsky, Ivan Visconti and Akshay Wadia
TCC 2012 pdf

2011

Leakage-Resilient Zero Knowledge
Sanjam Garg, Abhishek Jain and Amit Sahai
CRYPTO 2011 pdf
Round Optimal Blind Signatures
Sanjam Garg, Vanishree Rao, Amit Sahai, Dominique Schröder and Dominique Unruh
CRYPTO 2011 pdf
Bringing People of Different Beliefs Together to do UC
Sanjam Garg, Vipul Goyal, Abhishek Jain and Amit Sahai
TCC 2011 pdf

2010

Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai and Brent Waters
CCS 2010 pdf

2008

Improved bounds on security reductions for Discrete log based Signatures
Sanjam Garg, Raghav Bhaskar and Satyanarayana V. Lokam
CRYPTO 2008 pdf
Anti-DDoS Virtualized Operation System
Sanjam Garg and Huzur Saran
ARES 2008

2007

Unified Architecture for Large-Scale Attested Metering
Michael LeMay, George Gross, Carl A. Gunter and Sanjam Garg
HICSS 2007 pdf