Search results

  • 2024

    Adaptively Secure BLS Threshold Signatures from DDH and co-CDH

    Das, S. & Ren, L., 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer, p. 251-284 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14926 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bandwidth-Hard Functions: Reductions and Lower Bounds

    Blocki, J., Liu, P., Ren, L. & Zhou, S., Apr 2024, In: Journal of Cryptology. 37, 2, 16.

    Research output: Contribution to journalArticlepeer-review

  • Granular Synchrony

    Giridharan, N., Abraham, I., Crooks, N., Nayak, K. & Ren, L., Oct 24 2024, 38th International Symposium on Distributed Computing, DISC 2024. Alistarh, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 30. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 319).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2023

    Communication complexity of byzantine agreement, revisited

    Abraham, I., Chan, T. H. H., Dolev, D., Nayak, K., Pass, R., Ren, L. & Shi, E., Mar 2023, In: Distributed Computing. 36, 1, p. 3-28 26 p.

    Research output: Contribution to journalArticlepeer-review

  • On the Amortized Communication Complexity of Byzantine Broadcast

    Wan, J., Momose, A., Ren, L., Shi, E. & Xiang, Z., Jun 19 2023, PODC 2023 - Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 253-261 9 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • On the Security of KZG Commitment for VSS

    Momose, A., Das, S. & Ren, L., Nov 15 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2561-2575 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path

    Dai, X., Jin, H., Zhang, B. & Ren, L., Nov 15 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 504-518 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Practical Asynchronous High-threshold Distributed Key Generation and Distributed Polynomial Sampling

    Das, S., Xiang, Z., Kokoris-Kogias, L. & Ren, L., 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 5359-5376 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Practical Settlement Bounds for Longest-Chain Consensus

    Gaži, P., Ren, L. & Russell, A., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer, p. 107-138 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Threshold Signatures from Inner Product Argument: Succinct, Weighted, and Multi-threshold

    Das, S., Nieto, J., Camacho, P., Bünz, B., Xiang, Z. & Ren, L., Nov 15 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 356-370 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards Practical Sleepy BFT

    Malkhi, D., Momose, A. & Ren, L., Nov 15 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 490-503 14 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Vectorized Batch Private Information Retrieval

    Mughees, M. H. & Ren, L., 2023, Proceedings - 44th IEEE Symposium on Security and Privacy, SP 2023. Institute of Electrical and Electronics Engineers Inc., p. 437-452 16 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2023-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2022

    Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation

    Alhaddad, N., Das, S., Duan, S., Ren, L., Varia, M., Xiang, Z. & Zhang, H., Jul 20 2022, PODC 2022 - Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 399-417 19 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Brief Announcement: Asynchronous Verifiable Information Dispersal with Near-Optimal Communication

    Alhaddad, N., Das, S., Duan, S., Ren, L., Varia, M., Xiang, Z. & Zhang, H., Jul 20 2022, PODC 2022 - Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 418-420 3 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Constant Latency in Sleepy Consensus

    Momose, A. & Ren, L., Nov 7 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2295-2308 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Good-Case and Bad-Case Latency of Unauthenticated Byzantine Broadcast: A Complete Categorization

    Abraham, I., Ren, L. & Xiang, Z., Feb 1 2022, 25th International Conference on Principles of Distributed Systems, OPODIS 2021. Bramas, Q., Gramoli, V., Gramoli, V. & Milani, A. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 5. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 217).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Locality-Preserving Oblivious RAM

    Asharov, G., Chan, T. H. H., Nayak, K., Pass, R., Ren, L. & Shi, E., Apr 2022, In: Journal of Cryptology. 35, 2, 6.

    Research output: Contribution to journalArticlepeer-review

  • Practical Asynchronous Distributed Key Generation

    Das, S., Yurek, T., Xiang, Z., Miller, A., Kokoris-Kogias, L. & Ren, L., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. Institute of Electrical and Electronics Engineers Inc., p. 2518-2534 17 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Practical Settlement Bounds for Proof-of-Work Blockchains

    Gazi, P., Ren, L. & Russell, A., Nov 7 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1217-1230 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Spurt: Scalable Distributed Randomness Beacon with Transparent Setup

    Das, S., Krishnan, V., Isaac, I. M. & Ren, L., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. Institute of Electrical and Electronics Engineers Inc., p. 2502-2517 16 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Tuxedo: Maximizing Smart Contract Computation in PoW Blockchains

    Das, S., Awathare, N., Ren, L., Ribeiro, V. J. & Bellur, U., Jun 6 2022, SIGMETRICS/PERFORMANCE 2022 - Abstract Proceedings of the 2022 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems. Association for Computing Machinery, p. 63-64 2 p. (SIGMETRICS/PERFORMANCE 2022 - Abstract Proceedings of the 2022 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Asynchronous Data Dissemination and its Applications

    Das, S., Xiang, Z. & Ren, L., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2705-2721 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Good-case Latency of Byzantine Broadcast: A Complete Categorization

    Abraham, I., Nayak, K., Ren, L. & Xiang, Z., Jul 21 2021, PODC 2021 - Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 331-341 11 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Multi-Threshold Byzantine Fault Tolerance

    Momose, A. & Ren, L., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1686-1699 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • OnionPIR: Response Efficient Single-Server PIR

    Mughees, M. H., Chen, H. & Ren, L., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2292-2306 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Optimal communication complexity of authenticated byzantine agreement

    Momose, A. & Ren, L., Oct 1 2021, 35th International Symposium on Distributed Computing, DISC 2021. Gilbert, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 32. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 209).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Strengthened fault tolerance in byzantine fault tolerant replication

    Xiang, Z., Malkhi, D., Nayak, K. & Ren, L., Jul 2021, Proceedings - 2021 IEEE 41st International Conference on Distributed Computing Systems, ICDCS 2021. Institute of Electrical and Electronics Engineers Inc., p. 205-215 11 p. (Proceedings - International Conference on Distributed Computing Systems; vol. 2021-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Tuxedo: Maximizing Smart Contract Computation in PoW Blockchains

    Das, S., Awathare, N., Ren, L., Ribeiro, V. J. & Bellur, U., Dec 2021, In: Proceedings of the ACM on Measurement and Analysis of Computing Systems. 5, 3, 41.

    Research output: Contribution to journalArticlepeer-review

  • 2020

    A Retrospective on Path ORAM

    Stefanov, E., van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X. & Devadas, S., Aug 2020, In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 39, 8, p. 1572-1576 5 p., 8747366.

    Research output: Contribution to journalArticlepeer-review

  • Brief announcement: Byzantine agreement, broadcast and state machine replication with optimal good-case latency

    Abraham, I., Nayak, K., Ren, L. & Xiang, Z., Oct 1 2020, 34th International Symposium on Distributed Computing, DISC 2020. Attiya, H. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 179).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bucket Oblivious Sort: An Extremely Simple Oblivious Sort

    Asharov, G., Chan, T. H. H., Nayak, K., Pass, R., Ren, L. & Shi, E., 2020, 3rd SIAM Symposium on Simplicity in Algorithms, SOSA 2020. Farach-Colton, M. & Gortz, I. L. (eds.). Society for Industrial and Applied Mathematics Publications, p. 8-14 7 p. (3rd SIAM Symposium on Simplicity in Algorithms, SOSA 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improved extension protocols for byzantine broadcast and agreement

    Nayak, K., Ren, L., Shi, E., Vaidya, N. H. & Xiang, Z., Oct 1 2020, 34th International Symposium on Distributed Computing, DISC 2020. Attiya, H. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 179).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the Optimality of Optimistic Responsiveness

    Shrestha, N., Abraham, I., Ren, L. & Nayak, K., Oct 30 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 839-857 19 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Sync HotStuff: Simple and practical synchronous state machine replication

    Abraham, I., Malkhi, D., Nayak, K., Ren, L. & Yin, M., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 106-118 13 p. 9152792. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2019

    Breaking the Oblivious-RAM Bandwidth Wall

    Omar, H., Haider, S. K., Ren, L., Dijk, M. V. & Khan, O., Jan 16 2019, Proceedings - 2018 IEEE 36th International Conference on Computer Design, ICCD 2018. Institute of Electrical and Electronics Engineers Inc., p. 115-122 8 p. 8615676. (Proceedings - 2018 IEEE 36th International Conference on Computer Design, ICCD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Communication complexity of byzantine agreement, revisited

    Abraham, I., Chan, T. H. H., Dolev, D., Nayak, K., Pass, R., Ren, L. & Shi, E., Jul 16 2019, PODC 2019 - Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 317-326 10 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Design and Implementation of the Ascend Secure Processor

    Ren, L., Fletcher, C. W., Kwon, A., Van Dijk, M. & Devadas, S., Mar 1 2019, In: IEEE Transactions on Dependable and Secure Computing. 16, 2, p. 204-216 13 p., 7886270.

    Research output: Contribution to journalArticlepeer-review

  • Flexible Byzantine fault tolerance

    Malkhi, D., Nayak, K. & Ren, L., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1041-1053 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Locality-preserving oblivious RAM

    Asharov, G., Hubert Chan, T. H., Nayak, K., Pass, R., Ren, L. & Shi, E., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer, p. 214-243 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Onion ring oram: Efficient constant bandwidth oblivious RAM from (leveled) TFHE

    Chen, H., Chillotti, I. & Ren, L., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 345-360 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected $$O(n^2)$$ Communication, and Optimal Resilience

    Abraham, I., Devadas, S., Dolev, D., Nayak, K. & Ren, L., 2019, Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Revised Selected Papers. Goldberg, I. & Moore, T. (eds.). Springer, p. 320-334 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11598 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Bandwidth-hard functions: Reductions and lower bounds

    Blocki, J., Ren, L. & Zhou, S., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1820-1836 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Path ORAM: An extremely simple oblivious RAM protocol

    Stefanov, E., Dijk, M. V. A. N., Elaine, S. H. I., Chan, T. H. H., Fletcher, C. W., Ren, L., Yu, X. & Devadas, S., Apr 2018, In: Journal of the ACM. 65, 4, 18.

    Research output: Contribution to journalArticlepeer-review

  • Solida: A blockchain protocol based on reconfigurable Byzantine consensus

    Abraham, I., Malkhi, D., Nayak, K., Ren, L. & Spiegelman, A., Mar 1 2018, 21st International Conference on Principles of Distributed Systems, OPODIS 2017. Aspnes, J., Leitao, J., Bessani, A. & Felber, P. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 25. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 95).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    A note on the security of equihash

    Alcock, L. & Ren, L., Nov 3 2017, CCSW 2017 - Proceedings of the 2017 Cloud Computing Security Workshop, co-located with CCS 2017. Association for Computing Machinery, p. 51-55 5 p. (CCSW 2017 - Proceedings of the 2017 Cloud Computing Security Workshop, co-located with CCS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Asymptotically tight bounds for composing ORAM with PIR

    Abraham, I., Fletcher, C. W., Nayak, K., Pinkas, B. & Ren, L., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer, p. 91-120 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bandwidth Hard Functions for ASIC Resistance

    Ren, L. & Devadas, S., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer, p. 466-492 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Brief announcement: Practical synchronous byzantine consensus

    Abraham, I., Devadas, S., Nayak, K. & Ren, L., Oct 1 2017, 31st International Symposium on Distributed Computing, DISC 2017. Richa, A. W. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 91).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Fpga implementation of a cryptographically-secure puf based on learning parity with noise

    Jin, C., Herder, C., Ren, L., Nguyen, P. H., Fuller, B., Devadas, S. & van Dijk, M., Dec 2017, In: Cryptography. 1, 3, p. 1-20 20 p., 23.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • HOP: Hardware makes Obfuscation Practical

    Nayak, K., Fletcher, C. W., Ren, L., Chandran, N., Lokam, S., Shi, E. & Goyal, V., 2017, 24th Annual Network and Distributed System Security Symposium, NDSS 2017. The Internet Society, (24th Annual Network and Distributed System Security Symposium, NDSS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution