AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functions) tend to be less efficient than constructions based on specific (e.g., number-theoretic) assumptions. This has prompted a recent line of research aimed at investigating the best possible efficiency of (black-box) cryptographic constructions based on general assumptions. Here, we present bounds on the efficiency of statistically-binding commitment schemes constructed using black-box access to one-way permutations; our bounds are tight for the case of perfectly-binding schemes. Our bounds hold in an extension of the Impagliazzo–Rudich model: we show that any construction beating our bounds would imply the unconditional existence of a one-wa...
We give a construction of statistically-hiding commitment schemes (ones where the hiding property ho...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
Determining the minimal assumptions needed to construct various cryptographic building blocks has be...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
Abstract. We present a lower bound on the round complexity of a natural class of black-box construct...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
International audienceBlack-box separations have been successfully used to identify the limits of a ...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
The seminal result of Impagliazzo and Rudich (STOC 1989) gave a black-box separation between one-way...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
Abstract. We continue the study of the efficiency of black-box reductions in cryptography. We focus ...
We give a construction of statistically-hiding commitment schemes (ones where the hiding property ho...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
Determining the minimal assumptions needed to construct various cryptographic building blocks has be...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
Abstract. We present a lower bound on the round complexity of a natural class of black-box construct...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
International audienceBlack-box separations have been successfully used to identify the limits of a ...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
The seminal result of Impagliazzo and Rudich (STOC 1989) gave a black-box separation between one-way...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
Abstract. We continue the study of the efficiency of black-box reductions in cryptography. We focus ...
We give a construction of statistically-hiding commitment schemes (ones where the hiding property ho...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...