This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2020Cataloged from PDF of thesis.Includes bibliographical references (pages 155-171).Despite 40+ years of amazing progress, cryptography is constantly plagued by two simple problems: keeping secret keys secret and making public keys public. For example, public-key encryption is secure only if each user (1) keeps his secret key out of the hands of the adversary and (2) correctly distributes his public key to all other users. This thesis seeks to address these two fundamental problems. Fi...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
An $(n, t)$-Non-Interactive Verifiable Secret Sharing (NI-VSS) scheme allows a dealer to share a sec...
Numerous cryptographic applications require a trusted authority to hold a secret. With a plethora o...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secur...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
Availability has become a primary goal of information security and is as significant as other goals,...
Private Polynomial Evaluation (PPE) allows the service provider to outsource the computation of a po...
Key distribution schemes play a significant role in key assignment schemes which allow participants ...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, ...
One of the fundamental tasks of cryptography is to enable confidential communication across a public...
Threshold cryptography increases security and resilience by sharing a private cryptographic key over...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
An $(n, t)$-Non-Interactive Verifiable Secret Sharing (NI-VSS) scheme allows a dealer to share a sec...
Numerous cryptographic applications require a trusted authority to hold a secret. With a plethora o...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secur...
We study secret sharing schemes for general (non-threshold) access structures. A general secret shar...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
Availability has become a primary goal of information security and is as significant as other goals,...
Private Polynomial Evaluation (PPE) allows the service provider to outsource the computation of a po...
Key distribution schemes play a significant role in key assignment schemes which allow participants ...
We study the design of cryptographic primitives resistant to a large class of side-channel attacks, ...
One of the fundamental tasks of cryptography is to enable confidential communication across a public...
Threshold cryptography increases security and resilience by sharing a private cryptographic key over...
After four decades of public key cryptography, both the industry and academia seek better solutions ...
An $(n, t)$-Non-Interactive Verifiable Secret Sharing (NI-VSS) scheme allows a dealer to share a sec...
Numerous cryptographic applications require a trusted authority to hold a secret. With a plethora o...