socrates1024's Avatar

socrates1024

@socrates1024.bsky.social

junior product @ teleport.best adjunct associate prof @ uiuc

572 Followers  |  456 Following  |  157 Posts  |  Joined: 10.04.2023  |  1.6772

Latest posts by socrates1024.bsky.social on Bluesky

Abstract. Secure multi-party computation (MPC) enables N parties to jointly evaluate any function over their private inputs while preserving confidentiality. While decades of research have produced concretely efficient protocols for small to moderate numbers of participants, scaling MPC to thousands of parties remains a central challenge. Most of the existing approaches either incur per-party costs linear in N, due to pairwise computations, or rely on heavy cryptographic tools such as homomorphic encryption, which introduces prohibitive overheads when evaluating Boolean circuits.

In this work, we introduce a new lightweight approach to designing semi-honest MPC protocols with per-party, per-gate computation and communication costs that are independent of N. Our construction leverages the Sparse Learning Parity with Noise (Sparse LPN) assumption in the random oracle model to achieve per-gate costs of O(k² ⋅ c(λ)) computation and O(c(λ)) communication, where k is the sparsity parameter for the Sparse LPN assumption and c(λ) is an arbitrarily small super-constant in the security parameter λ. Assuming Sparse LPN remains hard for any super-constant sparsity, this yields the first semi-honest MPC protocol in the dishonest-majority setting with per-party per-gate costs bounded by an arbitrarily small super-constant overhead in λ.

Structurally, our MPC instantiates a Beaver style MPC with the required correlations generated efficiently. Departing from prior approaches that generate Beaver triples silently (Boyle et al., 2019; 2020; 2022) or using homomorphic computation (Damgård et al., 2012) for Beaver style MPC, the focus of this work rests on efficiently generating a weaker correlation. In particular, using Sparse LPN we show that if we relax the correctness requirement in generating random Beaver triples to permit a tunably small inverse-polynomial error probability, such triples can be silently generated with arbitrarily small super-constant per-party computation. We then show that such correlations can be used in an efficient online phase similar to Beaver’s protocol (with a tiny super-constant factor blow-up in communication).

Abstract. Secure multi-party computation (MPC) enables N parties to jointly evaluate any function over their private inputs while preserving confidentiality. While decades of research have produced concretely efficient protocols for small to moderate numbers of participants, scaling MPC to thousands of parties remains a central challenge. Most of the existing approaches either incur per-party costs linear in N, due to pairwise computations, or rely on heavy cryptographic tools such as homomorphic encryption, which introduces prohibitive overheads when evaluating Boolean circuits. In this work, we introduce a new lightweight approach to designing semi-honest MPC protocols with per-party, per-gate computation and communication costs that are independent of N. Our construction leverages the Sparse Learning Parity with Noise (Sparse LPN) assumption in the random oracle model to achieve per-gate costs of O(k² ⋅ c(λ)) computation and O(c(λ)) communication, where k is the sparsity parameter for the Sparse LPN assumption and c(λ) is an arbitrarily small super-constant in the security parameter λ. Assuming Sparse LPN remains hard for any super-constant sparsity, this yields the first semi-honest MPC protocol in the dishonest-majority setting with per-party per-gate costs bounded by an arbitrarily small super-constant overhead in λ. Structurally, our MPC instantiates a Beaver style MPC with the required correlations generated efficiently. Departing from prior approaches that generate Beaver triples silently (Boyle et al., 2019; 2020; 2022) or using homomorphic computation (Damgård et al., 2012) for Beaver style MPC, the focus of this work rests on efficiently generating a weaker correlation. In particular, using Sparse LPN we show that if we relax the correctness requirement in generating random Beaver triples to permit a tunably small inverse-polynomial error probability, such triples can be silently generated with arbitrarily small super-constant per-party computation. We then show that such correlations can be used in an efficient online phase similar to Beaver’s protocol (with a tiny super-constant factor blow-up in communication).

Image showing part 2 of abstract.

Image showing part 2 of abstract.

A New Approach to Large Party Beaver-Style MPC with Small Computational Overhead (Aayush Jain, Huijia Lin, Nuozhou Sun) ia.cr/2025/2305

23.12.2025 00:02 — 👍 2    🔁 1    💬 0    📌 0
FC'26 : Call for Papers Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on...

Financial Cryptography

Final call for papers FC26
fc26.ifca.ai/cfp.html

Submission deadline: 20 September 2025

Conference:
2–6 March 2026
St. Kitts Marriott Resort

14.09.2025 12:03 — 👍 2    🔁 4    💬 1    📌 0
Abstract. Hashing to elliptic curve groups is a fundamental operation used in many cryptographic applications, including multiset hashing and BLS signatures. With the recent rise of zero-knowledge applications, they are increasingly used in constraint programming settings. For example, multiset hashing enables memory consistency checks in zkVMs, while BLS signatures are used in proof of stake protocols. In such cases, it becomes critical for hash-to-elliptic-curve-group constructions to be constraint-friendly such that one can efficiently generate succinct proofs of correctness. However, existing constructions rely on cryptographic hash functions that are expensive to represent in arithmetic constraint systems, resulting in high proving costs.

We propose a constraint-efficient alternative: a map-to-elliptic-curve-group relation that bypasses the need for cryptographic hash functions and can serve as a drop-in replacement for hash-to-curve constructions in practical settings, including the aforementioned applications. Our relation naturally supports non-deterministic map-to-curve choices making them more efficient in constraint programming frameworks and enabling efficient integration into zero-knowledge proofs. We formally analyze the security of our approach in the elliptic curve generic group model (EC-GGM).

Our implementation in Noir/Barretenberg demonstrates the efficiency of our construction in constraint programming: it achieves over 23× fewer constraints than the best hash-to-elliptic-curve-group alternatives, and, enables 50-100× faster proving times at scale.

Abstract. Hashing to elliptic curve groups is a fundamental operation used in many cryptographic applications, including multiset hashing and BLS signatures. With the recent rise of zero-knowledge applications, they are increasingly used in constraint programming settings. For example, multiset hashing enables memory consistency checks in zkVMs, while BLS signatures are used in proof of stake protocols. In such cases, it becomes critical for hash-to-elliptic-curve-group constructions to be constraint-friendly such that one can efficiently generate succinct proofs of correctness. However, existing constructions rely on cryptographic hash functions that are expensive to represent in arithmetic constraint systems, resulting in high proving costs. We propose a constraint-efficient alternative: a map-to-elliptic-curve-group relation that bypasses the need for cryptographic hash functions and can serve as a drop-in replacement for hash-to-curve constructions in practical settings, including the aforementioned applications. Our relation naturally supports non-deterministic map-to-curve choices making them more efficient in constraint programming frameworks and enabling efficient integration into zero-knowledge proofs. We formally analyze the security of our approach in the elliptic curve generic group model (EC-GGM). Our implementation in Noir/Barretenberg demonstrates the efficiency of our construction in constraint programming: it achieves over 23× fewer constraints than the best hash-to-elliptic-curve-group alternatives, and, enables 50-100× faster proving times at scale.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

Constraint-Friendly Map-to-Elliptic-Curve-Group Relations and Their Applications (Jens Groth, Harjasleen Malvai, Andrew Miller, Yi-Nuo Zhang) ia.cr/2025/1503

28.08.2025 08:56 — 👍 4    🔁 3    💬 0    📌 0
FC'26 : Call for Papers Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on...

Financial Cryptography '26 call for papers is up
fc26.ifca.ai/cfp.html

Paper submission deadline is September 16

03.08.2025 17:47 — 👍 4    🔁 0    💬 0    📌 0
Abstract. Atomic swaps enable asset exchanges across blockchains without relying on trusted intermediaries, and are a key component of decentralized finance (DeFi) ecosystems. Recently, Chung, Masserova, Shi, and Thyagarajan introduced Rapidash (Financial Cryptography 2025), an atomic swap protocol that remains incentive compatible under user-miner collusion, by ensuring that the honest strategy forms a coalition-resistant Nash equilibrium. However, their model assumes a closed system where players act solely based on internal protocol incentives. In practice, participants may be influenced by external incentives such as off-chain rewards or adversarial bribes, which can undermine such equilibrium guarantees.

In this work, we introduce a new game-theoretic notion, bounded maximin fairness, which ensures that honest participants remain protected against rational adversaries with arbitrary but bounded external incentives. We construct an atomic swap protocol that satisfies this notion, while preserving the equilibrium properties of prior work in the absence of external influence.

As we show, our protocol is easy to implement and can be instantiated even in Bitcoin’s limited scripting language.

Abstract. Atomic swaps enable asset exchanges across blockchains without relying on trusted intermediaries, and are a key component of decentralized finance (DeFi) ecosystems. Recently, Chung, Masserova, Shi, and Thyagarajan introduced Rapidash (Financial Cryptography 2025), an atomic swap protocol that remains incentive compatible under user-miner collusion, by ensuring that the honest strategy forms a coalition-resistant Nash equilibrium. However, their model assumes a closed system where players act solely based on internal protocol incentives. In practice, participants may be influenced by external incentives such as off-chain rewards or adversarial bribes, which can undermine such equilibrium guarantees. In this work, we introduce a new game-theoretic notion, bounded maximin fairness, which ensures that honest participants remain protected against rational adversaries with arbitrary but bounded external incentives. We construct an atomic swap protocol that satisfies this notion, while preserving the equilibrium properties of prior work in the absence of external influence. As we show, our protocol is easy to implement and can be instantiated even in Bitcoin’s limited scripting language.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

Fairness in the Wild: Secure Atomic Swap with External Incentives (Hao Chung, Elisaweta Masserova, Elaine Shi, Sri AravindaKrishnan Thyagarajan) ia.cr/2025/1086

10.06.2025 14:52 — 👍 3    🔁 2    💬 1    📌 0
Announcement post for Graze Grants (Beta) - we're funding new ATProto work, visit Graze.social (or really the link below in the next post) to apply

Announcement post for Graze Grants (Beta) - we're funding new ATProto work, visit Graze.social (or really the link below in the next post) to apply

We've been given an amazing opportunity with our round of funding to build out the next generation of the social web. Today, we're starting an experiment in paying that forward. Introducing Graze Grants, a project to help get other ATProto projects off the ground.

05.05.2025 21:32 — 👍 188    🔁 59    💬 5    📌 9

I am definitely trying to automate cross-posting everywhere! how better to practice w diff platforms

04.06.2025 13:23 — 👍 1    🔁 0    💬 0    📌 0

I like racoons

04.06.2025 10:07 — 👍 2    🔁 1    💬 0    📌 0
Video thumbnail

River Bandit Wildlife Rescue

28.05.2025 15:26 — 👍 859    🔁 104    💬 42    📌 6

whenever I'm up early I make sure to send a lot of emails

04.06.2025 10:07 — 👍 1    🔁 0    💬 1    📌 0

cops have their own distinct verb tense... like "I'm gonna have to ask you to step out of the vehicle"

well go on then

16.05.2025 23:59 — 👍 7    🔁 0    💬 1    📌 0
Post image

what makes a good abstraction? (and other weird thoughts and tangents)

Blogpost here: lmao.bearblog.dev/minimal-abst...

13.05.2025 16:28 — 👍 1    🔁 1    💬 0    📌 0

pilots address the cabin "the winds are from the east at 3 knots and the cloud layer starts at 7000 feet" like that means anything to the passengers.

I think theyre just pretending to be so unselfaware as to think everyone else is as obsessed with the weather too, affected hyper focus

13.05.2025 16:42 — 👍 0    🔁 0    💬 0    📌 0

up late making slides for a conference that doesn't exist

13.05.2025 01:09 — 👍 1    🔁 0    💬 0    📌 0

good terminology clarity for people who are still confused by the idea of an "AppView"

25.04.2025 22:12 — 👍 2    🔁 1    💬 1    📌 0
FC'25 : Financial Cryptography 2025 Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on...

Financial Cryptography 2025 begins now in Miyakojima fc25.ifca.ai

13.04.2025 23:41 — 👍 1    🔁 0    💬 0    📌 0

As such, we’re excited about this opportunity to put into practice the research ideas around individual and societal recommendation quality that our team has been thinking about (proceedings.neurips.cc/paper_files/..., dl.acm.org/doi/10.1145/...)

10.03.2025 15:12 — 👍 20    🔁 2    💬 1    📌 0

Our vision is state-of-the-art paper recommendation that takes the best of "social" (what made academic twitter great) and "content-based" (using modern NLP). Overtime, we will add (optional!) features using follower graph, interactions, text… Only possible using Bluesky algorithmic feed features

10.03.2025 18:14 — 👍 39    🔁 4    💬 1    📌 0

While right now the feed is based only on users you follow, over time we plan to build opt-in algorithmic recommendations to help you discover paper-related content matching your interests from across #academicsky

10.03.2025 15:12 — 👍 21    🔁 2    💬 1    📌 0
image.png

image.png

firefly is kind of an "authentication methods" playground, android app is my favorite though

16.03.2025 20:05 — 👍 1    🔁 0    💬 0    📌 0

I get Frontera in Chicago it's pretty good. I'll cheers to you next time I go, asynchronous dinner party!

29.01.2025 14:48 — 👍 3    🔁 0    💬 0    📌 0

I'm not in Atlanta :D

29.01.2025 14:46 — 👍 1    🔁 0    💬 1    📌 0
Post image

Who was in charge of font spacing for this episode of MR. ED?

29.12.2024 23:29 — 👍 25706    🔁 2569    💬 1564    📌 419
Post image

Beavis and Butt-Head go to Silent Hill

30.12.2024 00:40 — 👍 19027    🔁 5438    💬 86    📌 40
30.12.2024 04:07 — 👍 41    🔁 9    💬 6    📌 0

Carter has passed. An accomplished man. A brilliant legacy. Although for many of us he died years ago when he refused to condemn, gamer gate

29.12.2024 21:45 — 👍 22946    🔁 3065    💬 211    📌 137

"I contend that my knowledge is complete!"
"Per what?!?"
"Per Martin-Löf."

29.12.2024 17:42 — 👍 7    🔁 2    💬 0    📌 0

I've held punch cards in my hand, ha

26.12.2024 15:53 — 👍 1    🔁 0    💬 1    📌 0
Post image 01.12.2024 16:23 — 👍 325    🔁 76    💬 8    📌 4

@socrates1024 is following 20 prominent accounts