In Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudorandom function f (⋅) among n players in such a way that for all the inputs x, any u players can compute f (x) while t or fewer players fail to do so, where 0≤t≤u≤n. The idea behind the Micali–Sidney scheme is to generate and distribute secret seeds S = {s₁,...,Sd} of a polyrandom collection of functions, among the n players, each player gets a subset of S, in such a way that any u players together hold all the secret seeds in S while any t or fewer players will lack at least one element from S. The pseudo-random function is then computed as [mathematical equation unable to be inserted] where fSi(⋅)'s are poly-random functions. One question raised by Micali a...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
A shared coin is one which n players "simultaneously" hold and can later reveal, but no su...
Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a pseudo-ran...
In Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudo-random function ...
AbstractIn Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudo-random f...
In Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudo-random function ...
We present a method for converting shares of a secret into shares of the same secret in a different ...
We describe efficient constructions for various cryptographic primitives (both in privatekey and in ...
Abstract. We present a pseudo-random bit generator expanding a uniformly random bit-string r of leng...
A shared coin is one which n players \simultaneously " hold and can later reveal, but no su...
AbstractA pseudo-random function is a fundamental cryptographic primitive that is essential for encr...
Abstract. We describe efficient constructions for various cryptographic primitives in private-key as...
Abstract. A private-key cryptosystem may be viewed as a means by which a trusted dealer privately co...
We revisit “the randomized iterate ” technique that was originally used by Goldreich, Krawczyk, and ...
We consider two of the most fundamental theorems in Cryptography. The first, due to H˚astad et. al. ...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
A shared coin is one which n players "simultaneously" hold and can later reveal, but no su...
Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a pseudo-ran...
In Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudo-random function ...
AbstractIn Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudo-random f...
In Crypto’95, Micali and Sidney proposed a method for shared generation of a pseudo-random function ...
We present a method for converting shares of a secret into shares of the same secret in a different ...
We describe efficient constructions for various cryptographic primitives (both in privatekey and in ...
Abstract. We present a pseudo-random bit generator expanding a uniformly random bit-string r of leng...
A shared coin is one which n players \simultaneously " hold and can later reveal, but no su...
AbstractA pseudo-random function is a fundamental cryptographic primitive that is essential for encr...
Abstract. We describe efficient constructions for various cryptographic primitives in private-key as...
Abstract. A private-key cryptosystem may be viewed as a means by which a trusted dealer privately co...
We revisit “the randomized iterate ” technique that was originally used by Goldreich, Krawczyk, and ...
We consider two of the most fundamental theorems in Cryptography. The first, due to H˚astad et. al. ...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
A shared coin is one which n players "simultaneously" hold and can later reveal, but no su...
Luby and Rackoff [27] showed a method for constructing a pseudo-random permutation from a pseudo-ran...