Research Publications

The Algorand Foundation research team is dedicated to developing and bringing innovations to the blockchain and cryptocurrencies space, in terms of technology and applications, and to enrich the Algorand capabilities and ecosystem. This mission is accomplished through broad cryptographic research and publications, the creation of educational materials, and the development of technology centered on the Algorand protocol. The team is also involved in developing funding programs through grants and special initiatives such as the Grants Program, University Program and Social Impact Program.

Meet our Esteemed Research Team

Craig Gentry
Research Fellow
Shai Halevi
Research Fellow
Hugo Krawczyk
Research Fellow
Fabrice Benhamouda
Research Fellow
Tal Rabin
Research Advisor

The current list of Research Group’s Publications and Professional Activities from the research team at the Algorand Foundation are listed below.

2021 Publications

  1. 1

    On the Local Leakage Resilience of Linear Secret Sharing Schemes. J. Cryptol. 34(2): 10 (2021)

    [j19] Fabrice BenhamoudaAkshay DegwekarYuval IshaiTal Rabin

  2. 2
  3. 3

    A hidden-password online password manager. SAC 2021: 1683-1686

    [c79] Maliheh ShirvanianChristopher Robert PriceMohammed JuburNitesh SaxenaStanislaw Jarecki, Hugo Krawczyk:

  4. 4

    Two-factor Password-authenticated Key Exchange with End-to-end Security. ACM Trans. Priv. Secur. 24(3): 17:1-17:37 (2021)

    [j20] Stanislaw JareckiMohammed Jubur, Hugo Krawczyk, Nitesh SaxenaMaliheh Shirvanian

  5. 5

    KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange. CRYPTO (4) 2021: 701-730

    [c81 ]Yanqi GuStanislaw Jarecki, Hugo Krawczyk

  6. 6

    On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. Public Key Cryptography (2) 2021: 380-409

    [c80] Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu

  7. 7
  8. 8

    Multi-Party Reusable Non-Interactive Secure Computation from LWE. EUROCRYPT (2) 2021: 724-753

    [c35] Fabrice Benhamouda, Aayush JainIlan KomargodskiHuijia Lin

  9. 9

    Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation. TCC (2) 2021: 129-161

    [c34] Fabrice BenhamoudaElette BoyleNiv GilboaShai HaleviYuval IshaiAriel Nof:

  10. 10

    Bootstrapping for HElib. J. Cryptol. 34(1): 7 (2021)

    [j19] Shai Halevi, Victor Shoup:

  11. 11

    Round-Optimal Secure Multi-party Computation. J. Cryptol. 34(3): 19 (2021)

    [j18] Shai Halevi, Carmit HazayAntigoni PolychroniadouMuthuramakrishnan Venkitasubramaniam:

  12. 12

    Random-Index PIR and Applications. TCC (3) 2021: 32-61

    [c107] Craig Gentry, Shai Halevi, Bernardo MagriJesper Buus NielsenSophia Yakoubov:

2020 Publications

  1. 1

    Can a Public Blockchain Keep a Secret?

    Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin

    Theory of Cryptography Conference (TCC), Nov. 2020.

  2. 2

    On the Cryptographic Deniability of the Signal Communication Protocol

    Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk, and Nihal Vatandas

    Conference on Applied Cryptography and Network Security (ACNS), Oct. 2020

2019 Publications

  1. 1

    Supporting private data on Hyperledger Fabric with secure multiparty computation

    Fabrice Benhamouda, Shai Halevi, Tzipora Halevi

    IBM Journal of Research and Development, Mar. 2019

  2. 2

    On the Tightness of Forward-Secure Signature Reductions

    Michel Abdalla, Fabrice Benhamouda, David Pointcheval

    Journal of Cryptology, 2019

  3. 3

    Building and Studying a Password Store that Perfectly Hides Passwords from Itself

    Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena

    IEEE Transactions on Dependable and Secure Computing (TDSC), 16 (5), 2019

  4. 4

    PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets

    H. Gunasinghe, A. Kundu, E. Bertino, H. Krawczyk, K. Singh, S. Chari, D. Song,

    The Web Conference, WWW’2019, May 2019

  5. 5

    Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps

    Michel Abdalla, Fabrice Benhamouda, Alain Passelègue

    Asiacrypt, Dec. 2019

  6. 6

    From Single-Input to Multi-client Inner-Product Functional Encryption

    Michel Abdalla, Fabrice Benhamouda, Romain Gay

    Asiacrypt, Dec. 2019

  7. 7

    Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation

    Tzipora Halevi, Fabrice Benhamouda, Angelo De Caro, Shai Halevi, Charanjit S. Jutla, Yacov Manevich, Qi Zhang

    IEEE International Conference on Blockchain, Blockchain, July 2019

  8. 8

    Decentralizing Inner-Product Functional Encryption

    Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner

    Public Key Cryptography (PKC), April 2019

  9. 9

    Updatable Oblivious Key Management for Storage Systems

    Stanislaw Jarecki, Hugo Krawczyk and Jason Resch

    2019 ACM SIGSAC Conference on Computer and Communications Security (CCS’19)

  10. 10

    Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft, Angelo Agatino Nicolosi

    Journal of Cryptology, 2019

  11. 11

    Cryptography for #MeToo

    Benjamin Kuykendall, Hugo Krawczyk, Tal Rabin

    PoPETS 2019

  12. 12

    On Fully Secure MPC with Solitary Output

    Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin

    Theory of Cryptography Conference (TCC), Dec. 2019

  13. 13

    Compressible FHE with Applications to PIR.

    Craig Gentry and Shai Halevi

    Theory of Cryptography Conference (TCC), Dec. 2019

  14. 14

    Homomorphic Encryption for Finite Automata

    Nicholas Genise, Craig Gentry, Shai Halevi, Baiyu Li, and Daniele Micciancio,

    Asiacrypt, Dec 2019

  15. 15

    Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free

    Adi Akavia, Craig Gentry, Shai Halevi, and Max Leibovich

    PoPETS 2019

  16. 16

    Homomorphic Training of 30,000 Logistic Regression Models

    Flavio Bergamaschi, Shai Halevi, Tzipora Halevi, and Hamish Hunt

    ACNS 2019

  17. 17

    An Improved RNS Variant of the BFV Homomorphic Encryption Scheme

    Shai Halevi, Yuriy Polyakov, and Victor Shoup

    RSA-CT 2019.

In the works

  1. 1

    YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles. CRYPTO (2) 2021: 64-93

    [c56] Craig GentryShai HaleviHugo KrawczykBernardo MagriJesper Buus NielsenTal RabinSophia Yakoubov

  2. 2

    Design and implementation of HElib: a homomorphic encryption library

    Shai Halevi and Victor Shoup

  3. 3

    Random-index PIR and Applications

    Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, and Sophia Yakoubov

  4. 4

    Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. Proc. Priv. Enhancing Technol. 2021(4): 528-548 (2021)

    [j17] Ghada Almashaqbeh, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, and Eran Tromer

Keynotes and Invited Lectures

  1. 1

    Foundation of Data Science – Virtual Talk Series, You Only Speak Once — Secure MPC with Stateless Ephemeral Roles (Tal)

  2. 2

    Keynote. Eurocrypt 2021, Zagreb, Croatia, October, 2021 (Craig)

  3. 3

    Future of PI: Challenges and Perspectives of Personal Identification, EuroS&P Workshop, September 2021, Viena (Hugo)

  4. 4
  5. 5

    NIST Workshop on Multi-Party Threshold Schemes 2020, You Only Speak Once – Secure MPC with Stateless Ephemeral Roles (Tal)

  6. 6

    The 3RD ZKProof Workshop Home Edition, Gage MPC - Going beyond the Residual Function Non-Interactive MPC Lower Bound (Tal)

  7. 7

    Advanced Cryptography: Promise, Progress, and Challenges, The Booz Allen Hamilton Distinguished Colloquium Series January 2020 (Shai)

  8. 8

    Cryptography for #MeToo. ACM Symposium on Access Control Models and Technologies, June 2020 (Tal)

  9. 9

    Can a Blockchain Keep a Secret? TPMPC 2020, May 2020 (Shai)

  10. 10

    “OPAQUE: Strong client-server password authentication for standardization. Real World Cryptography Workshop (RWC’19), San Jose, Jan 2019 (Hugo)

  11. 11

    Threshold Cryptography: Ready for Prime Time? NIST Threshold Cryptography Workshop, March  2019 (Hugo)

Professional Activities

  1. 1

    ZKProof Steering Committee: Standardization project for zero-knowledge proofs (Hugo)

  2. 2

    Journal of Cryptology, editor (Hugo, Tal)

  3. 3

    PKC 2021 Program Committee (Fabrice)

  4. 4

    Crypto 2021 Program Committee (Fabrice)

  5. 5

    Asiacrypt 2021 Program Committee (Fabrice - future)

  6. 6

    IACR vice president and board member (Shai)

  7. 7

    TCC steering committee (Shai)

  8. 8

    Eurocrypt 2021 Program committee (Shai)

  9. 9

    Homomorphicencryption.org steering committee (Shai)

  10. 10

    Advising Intel on their homomorphic encryption hardware acceleration project (Shai)

  11. 11

    EuroS&P 2021 Program Committee (Tal)

  12. 12

    Kanellakis Award Committee (Chair, Tal)

  13. 13

    Test of Time Award committee, Theory of Cryptography Conference (TCC)

  14. 14

    Simons Foundation, Mathematics and Physical Sciences, Scientific Advisory Board (Tal)

  15. 15

    Podcast co-host, Real World Cryptographers Podcast (Tal)

  16. 16

    Workshop with panels for students, junior faculty and women, Crypto 2021, co-org (Tal)

  17. 17

    Women in Blockchain, organized by Ripple UBRI (Tal)

  18. 18

    Scientific Advisory Committee Member, CWI - Centrum Wiskunde & Informatics (Hugo)

  19. 19

    Encrypted Search, ICERM, Brown University Jun 10 - 14, 2019 (Hugo)

  20. 20

    New York CryptoDay Organizers (Tal, Fabrice)

Research Community Support (Excludes Grants)

  1. 1

    Sponsorship of 4th Annual ZKProof Workshop, April 2021

  2. 2

    Sponsorship of BAF, Blockchain Acceleration Foundation, 2020-2021

  3. 3

    UC Davis Invited Lecture (Fabrice, Tal): Fall 2020

  4. 4