Elette Boyle


eboyle [at] alum [dot] mit [dot] edu

Director FACT Research Center

Senior Scientist at NTT Research


Associate Professor

Head of RRIS International Program
Efi Arazi School of Computer Science
Reichman University (IDC Herzliya), Israel


I received my Ph.D. in Mathematics at MIT, under the guidance of Shafi Goldwasser (and Yael Tauman Kalai). 2013-2015 I was a postdoctoral researcher at the Technion Israel Institute of Technology, hosted by Yuval Ishai. Summer 2013 I was a short-term postdoc at Cornell University (Cornell Tech NYC), hosted by Rafael Pass. Before MIT, I completed my undergraduate work in math at Caltech.

My research interests include cryptography, computer security, coding theory, algorithms, and other areas in the foundations of computer science.

Students:
Pierre Meyer (Ph.D.) (co-advised by Geoffroy Couteau)
Matan Hamilis (Ph.D.)
D'or Banon (MSc.) (co-advised by Ran Cohen)

Check out our survey (Jan 2022) on Function Secret Sharing, Homomorphic Secret Sharing, and Pseudorandom Correlation Generators: Survey

Elette Boyle

 

Publications

  • Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, and Yaxin Tu
    Improved Constructions for Distributed Multi-Point Functions
    Oakland 2025 - IEEE Symposium on Security and Privacy.
  • Elette Boyle, Niv Gilboa, Matan Hamilis, Yuval Ishai, and Ariel Nof
    Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer
    Oakland 2025 - IEEE Symposium on Security and Privacy.

  • Elette Boyle, Lisa Kohl, Zhe Li, and Peter Scholl
    Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism
    Asiacrypt 2024 - International Conference on the Theory and Applications of Cryptology and Information Security.
    [Abstract] [PDF]

  • Amit Agarwal, Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Mahimna Kelkar, and Yiping Ma
    Secure Sorting and Selection via Function Secret Sharing
    CCS 2024 - ACM Conference on Computer and Communications Security.
    [Abstract]

  • D'or Banoun, Elette Boyle, and Ran Cohen
    Information-Theoretic Topology-Hiding Broadcast: Wheels, Stars, Friendship, and Beyond
    ITC 2024 - Conference on Information-Theoretic Cryptography.
    [Abstract] [PDF]

  • Amit Agarwal, Elette Boyle, Niv Gilboa, Yuval Ishai, Mahimna Kelkar, and Yiping Ma
    Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators
    CRYPTO 2024 - International Conference on Cryptology.
    [Abstract]

  • Elette Boyle, Ilan Komargodski, and Neekon Vafa
    Memory Checking Requires Logarithmic Overhead
    STOC 2024 - ACM Symposium on Theory of Computing.
    [Abstract] [PDF]

  • Eden Aldema Tshuva, Elette Boyle, Ran Cohen, Tal Moran, Rotem Oshman
    Locally Verifiable Distributed SNARGs
    TCC 2023 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Erica Blum, Elette Boyle, Ran Cohen, and Chen-Da Liu-Zhang
    Communication Lower Bounds for Cryptographic Broadcast Protocols
    DISC 2023 - The International Symposium on Distributed Computing.
    Invited to Distributed Computing journal.

    [Abstract] [PDF]

  • Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai
    Arithmetic Sketching
    CRYPTO 2023 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, and Pierre Meyer
    Sublinear-Communication Secure Multiparty Computation Does Not Require FHE
    Advances in Cryptology - EUROCRYPT 2023.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, and Peter Scholl
    Oblivious Transfer with Constant Computational Overhead
    Advances in Cryptology - EUROCRYPT 2023.
    [Abstract] [PDF]

  • Elette Boyle, Yuval Ishai, Pierre Meyer, Robert Robere, and Gal Yehuda
    On Low-End Obfuscation and Learning
    ITCS 2023 - Innovations in Theoretical Computer Science.
    [Abstract]

  • Elette Boyle, Geoffroy Couteau, and Pierre Meyer
    Sublinear Secure Computation from New Assumptions
    TCC 2022 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, Yuval Ishai, and Victor Kolobov
    Programmable Distributed Point Functions
    CRYPTO 2022 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, and Peter Scholl
    Correlated Pseudorandomness from Expand-Accumulate Codes
    CRYPTO 2022 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, Yuval Ishai, and Victor Kolobov
    Information-Theoretic Distributed Point Functions
    ITC 2022 - Conference on Information-Theoretic Cryptography.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, Yuval Ishai, and Ariel Nof
    Secure Multiparty Computation with Sublinear Preprocessing
    Advances in Cryptology - EUROCRYPT 2022.
    [Abstract]

  • Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, and Ohad Klein
    Locality-Preserving Hashing for Shifts with Connections to Cryptography
    ITCS 2022 - Innovations in Theoretical Computer Science.
    [Abstract] [PDF]

  • Fabrice Benhamouda, Elette Boyle, Niv Gilboa, Shai Halevi, Yuval Ishai, and Ariel Nof
    Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
    TCC 2021 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, Yuval Ishai, and Ariel Nof
    Sublinear GMW-Style Compiler for MPC with Preprocessing
    CRYPTO 2021 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, and Peter Scholl
    Low-Complexity Weak Pseudorandom Functions in AC0[Mod2]
    CRYPTO 2021 - International Conference on Cryptology.
    [Abstract]

  • Elette Boyle, Ran Cohen, and Aarushi Goel
    Breaking the O(sqrt n)-Bit Barrier: Byzantine Agreement with Polylog Bits Per-Party
    PODC 2021 - ACM Symposium on Principles of Distributed Computing.
    [Abstract] [PDF]

  • Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, and Mayank Rathee
    Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
    Advances in Cryptology - EUROCRYPT 2021.
    [Abstract] [PDF]

  • Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai
    Lightweight Techniques for Private Heavy Hitters
    Oakland 2021 - IEEE Symposium on Security and Privacy.
    [Abstract] [PDF]

  • Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer, and Tal Moran
    Topology-Hiding Communication from Minimal Assumptions
    TCC 2020 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, Yuval Ishai, and Ariel Nof
    Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs
    Asiacrypt 2020 - International Conference on the Theory and Applications of Cryptology and Information Security.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, and Peter Scholl
    Correlated Pseudorandom Functions from Variable-Density LPN
    FOCS 2020 - IEEE Symposium on Foundations of Computer Science.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, and Peter Scholl
    Efficient Pseudorandom Correlation Generators from Ring-LPN
    CRYPTO 2020 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Desphande, Alon Rosen, Vinod Vaikuntanathan, and Prashant Vasudevan
    Cryptography from Information Loss
    ITCS 2020 - Innovations in Theoretical Computer Science.
    [Abstract] [PDF]

  • Elette Boyle, Justin Holmgren, and Mor Weiss
    Permuted Puzzles and Cryptographic Hardness
    TCC 2019 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, and Yuval Ishai
    Secure Computation with Preprocessing via Function Secret Sharing
    TCC 2019 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Marshall Ball, Elette Boyle, Ran Cohen, Tal Malkin, and Tal Moran
    Is Information-Theoretic Topology-Hiding Computation Possible?
    TCC 2019 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, and Peter Scholl
    Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation
    CCS 2019 - ACM Conference on Computer and Communications Security.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, Yuval Ishai, and Ariel Nof
    Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs
    CCS 2019 - ACM Conference on Computer and Communications Security.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, and Peter Scholl
    Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
    CRYPTO 2019 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai
    Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
    CRYPTO 2019 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle, Lisa Kohl, and Peter Scholl
    Homomorphic Secret Sharing from Lattices Without FHE
    Advances in Cryptology - EUROCRYPT 2019.
    [Abstract] [PDF]

  • Elette Boyle, Rio LaVigne, and Vinod Vaikuntanathan
    Adversarially Robust Property-Preserving Hash Functions
    ITCS 2019 - Innovations in Theoretical Computer Science.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, Niv Gilboa, and Yuval Ishai
    Compressing Vector OLE
    CCS 2018 - ACM Conference on Computer and Communications Security.
    [Abstract] [PDF]

  • Elette Boyle, Ran Cohen, Deepesh Data, and Pavel Hubáček
    Must the Communication Graph of MPC Protocols be an Expander?
    CRYPTO 2018 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle, Yuval Ishai, and Antigoni Polychroniadou
    Limits of Practical Sublinear Secure Computation
    CRYPTO 2018 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle, Saleet Klein, Alon Rosen, and Gil Segev
    Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability
    SCN 2018 - Conference on Security and Cryptography for Networks.
    [Abstract] [PDF]

  • Elette Boyle, Abhishek Jain, Manoj Prabhakaran, and Ching-Hua Yu
    The Bottleneck Complexity of Secure Multiparty Computation
    ICALP 2018 - International Colloquium on Automata, Languages, and Programming.
    [Abstract] [PDF]

  • Marshall Ball, Elette Boyle, Tal Malkin, and Tal Moran
    Exploring the Boundaries of Topology-Hiding Computation
    Advances in Cryptology - EUROCRYPT 2018.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Rachel Lin, and Stefano Tessaro
    Foundations of Homomorphic Secret Sharing
    ITCS 2018 - Innovations in Theoretical Computer Science.
    [Abstract] [PDF]

  • Elette Boyle
    Recent Advances in Function & Homomorphic Secret Sharing (Invited Talk)
    Indocrypt 2017 - the International Conference on Cryptology in India.
    [Abstract] [PDF]

  • Elette Boyle, Yuval Ishai, Rafael Pass, and Mary Wootters
    Can We Access a Database Both Locally and Privately?
    TCC 2017 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, and Michele Orrù
    Homomorphic Secret Sharing: Optimizations and Applications
    CCS 2017 - ACM Conference on Computer and Communications Security.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, and Yuval Ishai
    Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
    Advances in Cryptology - EUROCRYPT 2017.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, and Yuval Ishai
    Function Secret Sharing: Improvements and Extensions
    CCS 2016 - ACM Conference on Computer and Communications Security.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, and Yuval Ishai
    Breaking the Circuit-Size Barrier for Secure Computation Under DDH
    CRYPTO 2016 - International Conference on Cryptology.
    Best Paper Award
    [Abstract] [PDF]

  • Elette Boyle and Moni Naor
    Is There an Oblivious RAM Lower Bound?
    ITCS 2016 - Innovations in Theoretical Computer Science.
    [Abstract] [PDF]

  • Elette Boyle, Kai-Min Chung, and Rafael Pass
    Oblivious Parallel RAM
    TCC 2016 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, Yuval Ishai
    Function Secret Sharing
    Advances in Cryptology - EUROCRYPT 2015.
    [Abstract] [PDF]

  • Elette Boyle, Kai-Min Chung, and Rafael Pass
    Large-Scale Secure Computation
    CRYPTO 2015 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle and Rafael Pass
    Limits of Extractability Assumptions with Distributional Auxiliary Input
    Asiacrypt 2015 - International Conference on the Theory and Applications of Cryptology and Information Security.
    [Abstract] [PDF]

  • Elette Boyle, Kai-Min Chung, and Rafael Pass
    On Extractability (a.k.a. Differing-Inputs) Obfuscation
    TCC 2014 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Shafi Goldwasser, and Ioana Ivan
    Functional Signatures and Pseudorandom Functions
    PKC 2014 - International Conference on Practice and Theory of Public-Key Cryptography.
    [Abstract] [PDF]

  • Elette Boyle, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, and Amit Sahai
    Secure Computation Against Adaptive Auxiliary Information
    CRYPTO 2013 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle, Shafi Goldwasser, and Stefano Tessaro
    Communication Locality in Secure Multi-party Computation:
    How to Run Sublinear Algorithms in a Distributed Setting
    TCC 2013 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Shafi Goldwasser, Abhishek Jain, and Yael Tauman Kalai
    Multi-Party Computation Secure Against Continual Memory Leakage
    STOC 2012 - ACM Symposium on Theory of Computing.
    [Abstract] [PDF]

  • Elette Boyle, Shafi Goldwasser, and Yael Tauman Kalai
    Leakage-Resilient Coin Tossing
    DISC 2011 - The International Symposium on Distributed Computing.
    Invited to Distributed Computing journal.

    [Abstract] [PDF]

  • Elette Boyle, Gil Segev, and Daniel Wichs
    Fully Leakage-Resilient Signatures
    Advances in Cryptology - EUROCRYPT 2011.
    Invited to Journal of Cryptology.

    [Abstract] [PDF]

  • Elette Boyle and Federico Echenique
    Sequential Entry in Many-to-One Matching Markets
    Social Choice and Welfare, Springer, Vol 33(1), June 2009: pp 87-99.
    [Abstract] [PDF]

  • Elette Boyle and Robert McEliece
    Asymptotic Weight Enumerators of Randomly Punctured, Expurgated, and Shortened Code Ensembles
    46th Annual Allerton Conference on Communication, Control, and Computing, 2008.
    [Abstract] [PDF]

  • Elette Boyle
    Navigation on Mars: Validation of the Mars Science Laboratory Rover Hazard Avoidance Algorithm
    Caltech Undergraduate Research Journal Vol 5, 2006: pp 21-25.
    [Abstract]

Program Committees

  • NeurIPS 2022 Workshop on Algorithmic Fairness through the Lens of Causality and Privacy (AFCP).
  • CRYPTO 2022 - International Conference on Cryptology.
  • AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI) 2022.
  • Theory of Cryptography Conference (TCC) 2021.
  • Innovations in Theoretical Computer Science (ITCS) 2021.
  • PrivateNLP Workshop II (colocated EMNLP 2020).
  • AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI) 2020.
  • PrivateNLP Workshop (colocated WSDM 2020).
  • EUROCRYPT 2020.
  • ACM CCS 2019 Workshop on Privacy-Preserving Machine Learning.
  • Symposium on Foundations of Computer Science (FOCS) 2018.
  • ACM Conference on Computer and Communications Security (ACM CCS) 2017.
  • Theory of Cryptography Conference (TCC) 2017.
  • CRYPTO 2017 - International Conference on Cryptology.
  • Innovations in Theoretical Computer Science (ITCS) 2017.
  • Theory of Cryptography Conference (TCC) 2016B.
  • EUROCRYPT 2016.
  • Theory of Cryptography Conference (TCC) 2015.
  • Conference on Security and Cryptography for Networks (SCN) 2014.

Internships and Visits

  • Microsoft Research Silicon Valley
    Research Internship, Summer 2011

  • Weizmann Institute of Science
    Visiting Student, Spring and Summer 2010

  • US Department of Defense
    Research Internship, Director's Summer Program, Summer 2007

  • NASA Jet Propulsion Laboratory
    Research Internship, Robotic Software Systems Group, Summer 2005
    Mars Science Laboratory (Curiosity Rover) Mission.