CIS Lab Team
Sanjam Garg
Senior Scientist

Publications
- Reusable Two-round MPC from LPN
By Sanjam Garg, James Bartusek, Akshayaram Srinivasan & Yinuo Zhang
PKC 2022
- IBE with Incompressible Master Secret and Small Identity Secrets
By Sanjam Garg, Nico Döttling, Sruthi Sekar & Mingyuan Wang
TCC 2022
- A More Complete Analysis of the Signal Double Ratchet Algorithm
By Sanjam Garg, Alexander Bienstock, Jaiden Fairoze, Pratyay Mukherjee & Srinivasan Raghuraman
CRYPTO 2022
- Deletion Inference, Reconstruction, and Compliance in Machine (un)learning
By Sanjam Garg, Ji Gao, Mohammad Mahmoody & Prashant Nalini Vasudevan
CoRR abs 2022
- Factoring and Pairings Are Not Necessary for IO: Circular-Secure LWE Suffices
By Sanjam Garg, Zvika Brakerski, Nico Döttling & Giulio Malavolta
ICALP 2022
- Threshold Signatures in the Multiverse
By Sanjam Garg, Leemon Baird, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang & Yinuo Zhang
IEEE Symposium on Security and Privacy (SP) 2022
- Succinct Zero Knowledge for Floating Point Computations
By Sanjam Garg, A. Jain, Z. Jin & Y. Zhang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022
- Two-round Multiparty Secure Computation from Minimal Assumptions
By Sanjam Garg & A. Srinivasan
Journal of the ACM 2022
- Overparameterized (robust) Models from Computational Constraints
By Sanjam Garg, S. Jha, S. Mahloujifar, M. Mahmoody & M. Wang
IACR Cryptol. ePrint Arch. 2022
- End-to-End Secure Messaging with Traceability Only for Illegal Content
By Sanjam Garg, J. Bartusek, A. Jain & GV Policharla
Cryptology ePrint Archive 2022
- Cryptography with Weights: MPC, Encryption and Signatures
By Sanjam Garg, A. Jain, P. Mukherjee, R. Sinha, M. Wang & Y. Zhang
Cryptology ePrint Archive 2022
- Correlation Intractability and SNARGs from Sub-exponential DDHCryptography with Weights: MPC, Encryption and Signatures
By Sanjam Garg, AR Choudhuri, A. Jain, Z. Jin & J. Zhang
Cryptology ePrint Archive 2022
- On the Worst-case Inefficiency of CGKA
By Sanjam Garg, A. Bienstock, Y. Dodis, G. Grogan, M. Hajiabadi & P. Rösler
TCC 2022
- Reusable Two-round MPC from LPN
- Amortizing Rate-1 OT and Applications to PIR and PSI
By Sanjam Garg, Melissa Chase, Mohammad Hajiabadi, Jialin Li & Peihan Miao
TCC 2021
- Laconic Private Set Intersection and Applications
By Sanjam Garg, Navid Alamati, Pedro Branco, Nico Döttling, Mohammad Hajiabadi & Sihang Pu
TCC 2021
- Compact Ring Signatures from Learning with Errors
By Sanjam Garg, Rohit Chatterjee, Mohammad Hajiabadi, Dakshita Khurana, Xiao Liang, Giulio Malavolta, Omkant Pandey & Sina Shiehian
CRYPTO 2021
- How to Build a Trapdoor Function from an Encryption Scheme
By Sanjam Garg, Mohammad Hajiabadi, Giulio Malavolta & Rafail Ostrovsky
ASIACRYPT 2021
- A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks
By Sanjam Garg, Samuel Deng, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody & Abhradeep Guha Thakurta
NeurIPS 2021
- Is Private Learning Possible with Instance Encoding?
By Sanjam Garg, Nicholas Carlini, Samuel Deng, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta & Florian Tramèr
IEEE Symposium on Security and Privacy 2021
- NeuraCrypt is Not Private
By Sanjam Garg, Nicholas Carlini, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Florian Tramèr
CoRR abs 2021
- Amortizing Rate-1 OT and Applications to PIR and PSI
- FHE-Based Bootstrapping of Designated-Prover NIZK
By Sanjam Garg, Zvika Brakerski & Rotem Tsabary
TCC 2020
- Efficient Range-trapdoor Functions and Applications: Rate-1 OT and More
By Sanjam Garg, Mohammad Hajiabadi & Rafail Ostrovsky
TCC 2020
- Candidate iO from Homomorphic Encryption Schemes
By Sanjam Garg, Zvika Brakerski, Nico Döttling & Giulio Malavolta
EUROCRYPT 2020
- Two-round Oblivious Transfer from CDH or LPN
By Sanjam Garg, Nico Döttling, Mohammad Hajiabadi, Daniel Masny & Daniel Wichs
EUROCRYPT 2020
- Master-key KDM-secure IBE from Pairings
By Sanjam Garg, Romain Gay & Mohammad Hajiabadi
Public Key Cryptography 2020
- Reusable Two-Round MPC from DDH
By Sanjam Garg, James Bartusek, Daniel Masny & Pratyay Mukherjee
TCC 2020
- Separating Two-round Secure Computation from Oblivious Transfer
By Sanjam Garg, Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai & Akshayaram Srinivasan
ITCS 2020
- Adversarially Robust Learning Could Leverage Computational Hardness
By Sanjam Garg, Somesh Jha, Saeed Mahloujifar & Mohammad Mahmoody
ALT 2020
- Formalizing Data Deletion in the Context of the Right to Be Forgotten
By Sanjam Garg, Shafi Goldwasser & Prashant Nalini Vasudevan
EUROCYRPT 2020
- Ad Hoc Multi-Input Functional Encryption
By Sanjam Garg, Shweta Agrawal, Michael Clear, Ophir Frieder, Adam O’Neill & Justin Thaler
ITCS 2020
- Tight Verifiable Delay Functions
By Sanjam Garg, Nico Döttling, Giulio Malavolta & Prashant Nalini Vasudevan
SCN 2020
- Black-Box Constructions of Bounded-Concurrent Secure Computation
By Sanjam Garg, Xiao Liang, Omkant Pandey & Ivan Visconti
SCN 2020
- Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions
By Sanjam Garg, Zvika Brakerski, Pedro Branco, Nico Döttling & Giulio Malavolta
TCC 2020
- Obliviousness Makes Poisoning Adversaries Weaker
By Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody & Abhradeep Thakurta
CoRR abs 2020
- Is Private Learning Possible with Instance Encoding?
By Sanjam Garg, Nicholas Carlini, Samuel Deng, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Shuang Song, Abhradeep Thakurta & Florian Tramèr
CoRR abs 2020
- FHE-Based Bootstrapping of Designated-Prover NIZK
- Leveraging Linear Decryption: Rate-1 Fully-homomorphic Encryption and Time-lock Puzzles
By Sanjam Garg, Zvika Brakerski, Nico Döttling & Giulio Malavolta
TCC 2019
- Laconic Conditional Disclosure of Secrets and Applications
By Sanjam Garg, Nico Döttling, Vipul Goyal & Giulio Malavolta
FOCS 2019
- Trapdoor Hash Functions and Their Applications
By Sanjam Garg, Nico Döttling, Yuval Ishai, Giulio Malavolta, Tamer Mour & Rafail Ostrovsky
CRYPTO 2019
- New Techniques for Efficient Trapdoor Functions and Applications
By Sanjam Garg, Romain Gay & Mohammad Hajiabadi
EUROCYRPT 2019
- Registration-based Encryption from Standard Assumptions
By Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody, Ahmadreza Rahimi & Sruthi Sekar
Public Key Cryptography 2019
- The Broadcast Message Complexity of Secure Multiparty Computation
By Sanjam Garg, Aarushi Goel & Abhishek Jain
ASIACRYPT 2019
- Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
By Sanjam Garg, Nico Döttling, Mohammad Hajiabadi, Kevin Liu & Giulio Malavolta
ASIACRYPT 2019
- Obfuscation from Low Noise Multilinear Maps
By Sanjam Garg, Nico Döttling, Divya Gupta, Peihan Miao & Pratyay Mukherjee
INDOCRYPT 2018
- Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
By Sanjam Garg, Nir Bitansky, Ran Canetti, Justin Holmgren, Abhishek Jain, Huijia Lin, Rafael Pass, Sidharth Telang & Vinod Vaikuntanathan
SIAM J. Comput. 2018
- Two-Round Multiparty Secure Computation Minimizing Public Key Operations
By Sanjam Garg, Peihan Miao & Akshayaram Srinivasan
CRYPTO 2018
- Two-Round Multiparty Secure Computation from Minimal Assumptions
By Sanjam Garg & Akshayaram Srinivasan
EUROCRYPT 2018
- Adaptively Secure Garbling with Near Optimal Online Complexity
By Sanjam Garg & Akshayaram Srinivasan
EUROCRYPT 2018
- A New Approach to Black-Box Concurrent Secure Computation
By Sanjam Garg, Susumu Kiyoshima & Omkant Pandey
EUROCRYPT 2018
- New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
By Sanjam Garg, Nico Döttling, Mohammad Hajiabadi & Daniel Masny
Public Key Cryptography 2018
- Two-Round MPC: Information-Theoretic and Black-Box
By Sanjam Garg, Yuval Ishai & Akshayaram Srinivasan
TCC 2018
- A Simple Construction of iO for Turing Machines
By Sanjam Garg & Akshayaram Srinivasan
TCC 2018
- Trapdoor Functions from the Computational Diffie-Hellman Assumption
By Sanjam Garg & Mohammad Hajiabadi
CRYPTO 2018
- Registration-Based Encryption: Removing Private-Key Generator from IBE
By Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody & Ahmadreza Rahimi
TCC 2018
- Adaptive Garbled RAM from Laconic Oblivious Transfer
By Sanjam Garg, Rafail Ostrovsky & Akshayaram Srinivasan
CRYPTO 2018
- On the Round Complexity of OT Extension
By Sanjam Garg, Mohammad Mahmoody, Daniel Masny & Izaak Meckler
CRYPTO 2018
- Limits on the Power of Garbling Techniques for Public-Key Encryption
By Sanjam Garg, Mohammad Hajiabadi, Mohammad Mahmoody & Ameer Mohammed
Annual International Cryptology Conference 2018 CRYPTO 2018
- Garbled Protocols and Two-round MPC from Bilinear Maps
By Sanjam Garg & Akshayaram Srinivasan
FOCS 2017
- Identity-Based Encryption from the Diffie-Hellman Assumption
By Sanjam Garg & Nico Döttling
CRYPTO 2017
- Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
By Sanjam Garg, Saikrishna Badrinarayanan, Yuval Ishai, Amit Sahai & Akshay Wadia
ASIACRYPT 2017
- Laconic Oblivious Transfer and Its Applications
By Sanjam Garg, Chongwon Cho, Nico Döttling, Divya Gupta, Peihan Miao & Antigoni Polychroniadou
CRYPTO 2017
- Incremental Program Obfuscation
By Sanjam Garg & Omkant Pandey
CRYPTO 2017
- Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives
By Sanjam Garg, Mohammad Mahmoody & Ameer Mohammed
CRYPTO 2017
- Breaking the Sub-Exponential Barrier in Obfustopia
By Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan & Mark Zhandry
EUROCRYPT 2017
- On the Exact Round Complexity of Self-composable Two-Party Computation
By Sanjam Garg, Susumu Kiyoshima & Omkant Pandey
EUROCRYPT 2017
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
By Sanjam Garg, Daniel Apon, Nico Döttling & Pratyay Mukherjee
ICALP 2017
- When Does Functional Encryption Imply Obfuscation?
By Sanjam Garg, Mohammad Mahmoody & Ameer Mohammed
TCC 2017
- From Selective IBE to Full IBE and Selective HIBE
By Sanjam Garg & Nico Döttling
TCC 2017
- Obfuscation Without the Vulnerabilities of Multilinear Maps
By Sanjam Garg, Pratyay Mukherjee & Akshayaram Srinivasan
IACR Cryptol. ePrint Arch. 2016
- Hiding Secrets in Software: A Cryptographic Approach to Program Obfuscation
By Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai & Brent Waters
Commun. ACM 2016
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
By Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai & Brent Waters
SIAM J. Comput. 2016
- TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
By Sanjam Garg, Payman Mohassel & Charalampos Papamanthou
CRYPTO 2016
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
By Sanjam Garg, Omkant Pandey & Akshayaram Srinivasan
CRYPTO 2016
- The Exact Round Complexity of Secure Computation
By Sanjam Garg, Pratyay Mukherjee, Omkant Pandey & Antigoni Polychroniadou
EUROCRYPT 2016
- Secure Obfuscation in a Weak Multilinear Map Model
By Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan & Mark Zhandry
TCC 2016
- Single-Key to Multi-Key Functional Encryption with Polynomial Loss
By Sanjam Garg & Akshayaram Srinivasan
TCC 2016
- Functional Encryption Without Obfuscation
By Sanjam Garg, Craig Gentry, Shai Halevi & Mark Zhandry
TCC 2016
- Secure Multiparty RAM Computation in Constant Rounds
By Sanjam Garg, Divya Gupta, Peihan Miao & Omkant Pandey
TCC 2016
- Black-box Garbled RAM
By Sanjam Garg, Steve Lu & Rafail Ostrovsky
FOCS 2015
- Garbled RAM from One-way Functions
By Sanjam Garg, Steve Lu, Rafail Ostrovsky & Alessandra Scafuro
STOC 2015
Succinct Randomized Encodings and Their Applications
By Sanjam Garg, Nir Bitansky, Huijia Lin, Rafael Pass & Sidharth Telang
STOC 2015
TWORAM: Round-optimal Oblivious RAM with Applications to Searchable Encryption
By Sanjam Garg, Payman Mohassel & Charalampos PapamanthouIACR Cryptol. ePrint Arch. 2015
Cryptography with One-Way Communication
By Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky & Amit SahaiCRYPTO 2015
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
By Sanjam Garg & Antigoni PolychroniadouTCC 2015
On the Exact Cryptographic Hardness of Finding a Nash Equilibrium
By Sanjam Garg & Antigoni PolychroniadouIACR Cryptol. ePrint Arch. 2015
- Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions
By Sanjam Garg & Nishanth Chandran
INDOCRYPT 2014
- Fully Secure Functional Encryption Without Obfuscation
By Sanjam Garg, Craig Gentry, Shai Halevi & Mark Zhandry
IACR Cryptol. ePrint Arch. 2014
Fully Secure Attribute Based Encryption from Multilinear Maps
By Sanjam Garg, Craig Gentry, Shai Halevi & Mark ZhandryIACR Cryptol. ePrint Arch. 2014
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
By Sanjam Garg, Craig Gentry, Shai Halevi & Daniel WichsCRYPTO 2014
Protecting Obfuscation against Algebraic Attacks
By Sanjam Garg, Boaz Barak, Yael Tauman Kalai, Omer Paneth & Amit SahaiEUROCRYPT 2014
Efficient Round Optimal Blind Signatures
By Sanjam Garg & Divya GuptaEUROCRYPT 2014
Cross-Domain Secure Computation
By Sanjam Garg, Chongwon Cho & Rafail OstrovskyPublic Key Cryptography 2014
Program Obfuscation via Multilinear Maps
By Sanjam GargSCN 2014
Two-Round Secure MPC from Indistinguishability Obfuscation
By Sanjam Garg, Craig Gentry, Shai Halevi & Mariana RaykovaTCC 2014
Hardness Preserving Constructions of Pseudorandom Functions, Revisited
By Sanjam Garg & Nishanth ChandranIACR Cryptol. ePrint Arch. 2014
- Witness Encryption and Its Applications
By Sanjam Garg, Craig Gentry, Amit Sahai & Brent Waters
STOC 2013
Differing-inputs Obfuscation and Applications
By Sanjam Garg, Prabhanjan Ananth, Dan Boneh, Amit Sahai & Mark ZhandryIACR Cryptol. ePrint Arch. 2013
Candidate Multilinear Maps
By Sanjam GargUniversity of California, Los Angeles, 2013
Attribute-Based Encryption for Circuits from Multilinear Maps
By Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai & Brent WatersCRYPTO 2013
Secure Computation Against Adaptive Auxiliary Information
By Sanjam Garg, Elette Boyle, Abhishek Jain, Yael Tauman Kalai & Amit SahaiCRYPTO 2013
Candidate Multilinear Maps from Ideal Lattices
By Sanjam Garg, Craig Gentry & Shai HaleviEUROCRYPT 2013
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
By Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai & Brent WatersEUROCRYPT 2013
Why “Fiat-Shamir for Proofs” Lacks a Proof
By Sanjam Garg, Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana López-Alt & Daniel WichsTCC 2013
- Witness Encryption and Its Applications
- Adaptively Secure Multi-Party Computation with Dishonest Majority
By Sanjam Garg & Amit Sahai
CRYPTO 2012
- Impossibility Results for Static Input Secure Computation
By Sanjam Garg, Abishek Kumarasubramanian, Rafail Ostrovsky & Ivan Visconti
CRYPTO 2012
- Concurrently Secure Computation in Constant Rounds
By Sanjam Garg, Vipul Goyal, Abhishek Jain & Amit Sahai
EUROCRYPT 2012
- Resettable Statistical Zero Knowledge
By Sanjam Garg, Rafail Ostrovsky, Ivan Visconti & Akshay Wadia
TCC 2012
- Candidate Multilinear Maps from Ideal Lattices and Applications
By Sanjam Garg, Craig Gentry & Shai Halevi
IACR Cryptol. ePrint Arch. 2012
- Leakage-Resilient Zero Knowledge
By Sanjam Garg, Abhishek Jain & Amit Sahai
CRYPTO 2011 - Round Optimal Blind Signatures
By Sanjam Garg, Vanishree Rao, Amit Sahai, Dominique Schröder & Dominique Unruh
CRYPTO 2011 - Bringing People of Different Beliefs Together to Do UC
By Sanjam Garg, Vipul Goyal, Abhishek Jain & Amit Sahai
TCC 2011
- Building Efficient Fully Collusion-resilient Traitor Tracing and Revocation Schemes
By Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai & Brent Waters
CCS 2010
- Anti-DDoS Virtualized Operating System
By Sanjam Garg & Huzur Saran
ARES 2008
- Improved Bounds on Security Reductions for Discrete Log Based Signatures
By Sanjam Garg, Raghav Bhaskar & Satyanarayana V. Lokam
CRYPTO 2008
- Unified Architecture for Large-Scale Attested Metering
By Sanjam Garg, Michael LeMay, George Gross & Carl A. Gunter
HICSS 2007