Elette Boyle


eboyle [at] alum [dot] mit [dot] edu

I am a Senior Lecturer (Assistant Professor) at IDC Herzliya in Israel.

I was recently a postdoctoral researcher at the Technion Israel Institute of Technology, hosted by Yuval Ishai.

Previously, I was a Ph.D. student in the mathematics department at MIT, under the guidance of Shafi Goldwasser (and Yael Tauman Kalai). Before MIT, I completed my undergraduate work in math at Caltech.

Summer 2013 I was a short-term postdoc in cryptography at Cornell University (Cornell NYC Tech campus), hosted by Rafael Pass.

My research interests include cryptography, computer security, coding theory, algorithms, and other areas in the foundations of computer science.

Elette Boyle

 

Publications

  • Elette Boyle, Yuval Ishai, Rafael Pass, and Mary Wootters
    Can We Access a Database Both Locally and Privately?
    TCC 2017 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, and Michele Orrù
    Homomorphic Secret Sharing: Optimizations and Applications
    CCS 2017 - ACM Conference on Computer and Communications Security.
    [Abstract]

  • Elette Boyle, Niv Gilboa, and Yuval Ishai
    Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
    Advances in Cryptology - EUROCRYPT 2017.
    [Abstract]

  • Elette Boyle, Niv Gilboa, and Yuval Ishai
    Function Secret Sharing: Improvements and Extensions
    CCS 2016 - ACM Conference on Computer and Communications Security.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, and Yuval Ishai
    Breaking the Circuit-Size Barrier for Secure Computation Under DDH
    CRYPTO 2016 - International Conference on Cryptology.
    Best Paper Award
    [Abstract] [PDF]

  • Elette Boyle and Moni Naor
    Is There an Oblivious RAM Lower Bound?
    ITCS 2016 - Innovations in Theoretical Computer Science.
    [Abstract] [PDF]

  • Elette Boyle, Kai-Min Chung, and Rafael Pass
    Oblivious Parallel RAM
    TCC 2016 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Niv Gilboa, Yuval Ishai
    Function Secret Sharing
    Advances in Cryptology - EUROCRYPT 2015.
    [Abstract] [PDF]

  • Elette Boyle, Kai-Min Chung, and Rafael Pass
    Large-Scale Secure Computation
    CRYPTO 2015 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle and Rafael Pass
    Limits of Extractability Assumptions with Distributional Auxiliary Input
    Asiacrypt 2015 - International Conference on the Theory and Applications of Cryptology and Information Security.
    [Abstract] [PDF]

  • Elette Boyle, Kai-Min Chung, and Rafael Pass
    On Extractability (a.k.a. Differing-Inputs) Obfuscation
    TCC 2014 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Shafi Goldwasser, and Ioana Ivan
    Functional Signatures and Pseudorandom Functions
    PKC 2014 - International Conference on Practice and Theory of Public-Key Cryptography.
    [Abstract] [PDF]

  • Elette Boyle, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, and Amit Sahai
    Secure Computation Against Adaptive Auxiliary Information
    CRYPTO 2013 - International Conference on Cryptology.
    [Abstract] [PDF]

  • Elette Boyle, Shafi Goldwasser, and Stefano Tessaro
    Communication Locality in Secure Multi-party Computation:
    How to Run Sublinear Algorithms in a Distributed Setting
    TCC 2013 - Theory of Cryptography Conference.
    [Abstract] [PDF]

  • Elette Boyle, Shafi Goldwasser, Abhishek Jain, and Yael Tauman Kalai
    Multi-Party Computation Secure Against Continual Memory Leakage
    STOC 2012 - ACM Symposium on Theory of Computing.
    [Abstract] [PDF]

  • Elette Boyle, Shafi Goldwasser, and Yael Tauman Kalai
    Leakage-Resilient Coin Tossing
    DISC 2011 - The International Symposium on Distributed Computing.
    Invited to Distributed Computing.

    [Abstract] [PDF]

  • Elette Boyle, Gil Segev, and Daniel Wichs
    Fully Leakage-Resilient Signatures
    Advances in Cryptology - EUROCRYPT 2011.
    Invited to Journal of Cryptology.

    [Abstract] [PDF]

  • Elette Boyle and Federico Echenique
    Sequential Entry in Many-to-One Matching Markets
    Social Choice and Welfare, Springer, Vol 33(1), June 2009: pp 87-99.
    [Abstract] [PDF]

  • Elette Boyle and Robert McEliece
    Asymptotic Weight Enumerators of Randomly Punctured, Expurgated, and Shortened Code Ensembles
    46th Annual Allerton Conference on Communication, Control, and Computing, 2008.
    [Abstract] [PDF]

  • Elette Boyle
    Navigation on Mars: Validation of the Mars Science Laboratory Rover Hazard Avoidance Algorithm
    Caltech Undergraduate Research Journal Vol 5, 2006: pp 21-25.
    [Abstract]

Program Committees

  • ACM Conference on Computer and Communications Security (ACM CCS) 2017.
  • Theory of Cryptography Conference (TCC) 2017.
  • CRYPTO 2017 - International Conference on Cryptology.
  • Innovations in Theoretical Computer Science (ITCS) 2017.
  • Theory of Cryptography Conference (TCC) 2016B.
  • EUROCRYPT 2016.
  • Theory of Cryptography Conference (TCC) 2015.
  • Conference on Security and Cryptography for Networks (SCN) 2014.

Internships and Visits

  • Microsoft Research Silicon Valley
    Research Internship, Summer 2011

  • Weizmann Institute of Science
    Visiting Student, Spring and Summer 2010

  • US Department of Defense
    Research Internship, Director's Summer Program, Summer 2007

  • NASA Jet Propulsion Laboratory
    Research Internship, Robotic Software Systems Group, Summer 2005
    Mars Science Laboratory (Curiosity Rover) Mission.