Peter Rindal
I am currently a Ph.D. student at Oregon State University studying Cryptography and Secure Computation under my advisor Dr. Mike Rosulek. My primary interest is on the development of efficient methods for computing on encrypted data.

News

August 2018 ~ CCS 2018 Hat Trick! I'll see you there.
Feb. 2018 ~ My CCS 2017 talk on malicious secure PSI is now public, check it out.
Sept. 2017 ~ Just finished a summer internship at Visa Research. Looking forward to sharing our upcoming papers.

Curriculum Vitae

Updated May, 2018.
Contact me with any questions.

DOWNLOAD PDF

Contact

TEL
509.520.8701

Publications

Label-PSI from Fully Homomorphic Encryption with Malicious Security.
Hao Chen, Kim Laine & Peter Rindal -- [CCS'18]

DISE: DIstributed Symmetric-key Encryption
Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee & Peter Rindal -- [CCS'18]

ABY3: A Three Party Mix Protocol Framework for Machine Learning
Payman Mohassel & Peter Rindal -- [CCS'18, eprint]

PIR-PSI: Scaling Private Contact discovery.
Daniel Demmler, Peter Rindal, Mike Rosulek & Ni Trieu -- [PETS'18, eprint]

Malicious-Secure Private Set Intersection via Dual Execution
Peter Rindal & Mike Rosulek -- [CCS'17]

Fast Private Set Intersection from Homomorphic Encryption
Hao Chen, Kim Laine & Peter Rindal -- [CCS'17, ePrint]

Private Collaborative Neural Network Learning
Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter & Peter Rindal -- [ePrint]

Improved Private Set Intersection against Malicious Adversaries
Peter Rindal & Mike Rosulek -- [Eurocrypt'17, ePrint]

Private Queries on Encrypted Genomic Data
Gizem Cetin, Hao Chen, Kim Laine, Kristin Lauter, Peter Rindal & Yuhou Xia -- [BMC Medical Genomics'17, ePrint]

SplitCommit: Implementing and Analyzing Homomorphic UC Commitments.
Peter Rindal & Roberto Trifiletti -- [ePrint]

Secure Data Exchange: A Marketplace in the Cloud
Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Peter Rindal & Mike Rosulek -- [MSR, ePrint]

Faster Malicious 2-party Secure Computation with Online/Offline Dual Execution
Peter Rindal & Mike Rosulek -- [Usenix'16, ePrint]


Projects & Implementations

As of August 2017, 22+ Protocols implemented.
libOTe - A fast, portable, and easy to use Oblivious Transfer Library [github]
- semi-honest 1-out-of-2 OT [IKNP03].
- semi-honest 1-out-of-N OT [KKRT16].
- malicious 1-out-of-2 OT [KOS15].
- malicious 1-out-of-2 Delta-OT [KOS15],[BLNNOOSS15].
- malicious 1-out-of-N OT [OOS16].
- malicious approximate K-out-of-N OT [RR17].
- malicious 1-out-of-2 base OT [NP00].
Ivory-Runtime - A generic Secure Computation API for garbled circuits, SPDZ, etc. [github]
- semi-honest 2PC [Yao82],[ZRE14].
- semi-honest 3PC [FLNW16].
- more coming soon.
libPSI - A library for Private Set Intersection (PSI) [github]
- semi-honest Bloom filter PSI [DCW10].
- semi-honest cuckoo hashing PSI [KKRT16].
- malicious Bloom filter PSI [RR17a].
- malicious public key crypto PSI [DKT10].
- malicious cuckoo hashing PSI [RR17b].
- semi-honest PIR [BGI16].
PSI from Homomorphic Encrpyion
- semi-honest cuckoo hashing PSI [CLR17].
SplitCommit - A portable C++ XOR-homomorphic commitment scheme [github]
- malicious OT based XOR-homomorphic commitment scheme [FJNT16].
Batch Dual Execution - Malicious secure online/offline MPC implementation [github]
- malicious 2PC [RR16],[ZRE14],[KOS15].
Secure Data Exchange - Server aided MPC
- malicious MPC [GLLRR16].
Dynamic Searchable Encryption from ORAM
- Path ORAM [SDSCFRYD13].
- Burst ORAM [DSS14].
- Oblivious Trees [WNLCSSH14].

Talks

Improved Private Set Intersection against Malicious Adversaries
Eurocrypt, Paris, France, April 2017. [video, slides]
Theory and Practice of Secure Multiparty Computation, Bristol UK, April 2017. [slides]
Faster Malicious 2-party Secure Computation with Online/Offline Dual Execution
Usenix Security 2016, Austin Texas, USA, August 2016. [video, slides, pdf]
Theory and Practice of Secure Multiparty Computation, Aarhus Denmark, June 2016. [slides]
A Survey of Oblivious RAM Methods and Optimizations.
Oregon Cryptography Group, Intel, May 2015. [slides]
A Review of Two Party Completeness.
Information Theoretic Secure Computation Lecture, Oregon State University, November 2015. [slides]
A Review of Oblivious Transfer Extension.
Two Party Secure Computation Lecture, Oregon State University, March 2014. [slides]