In the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the state of the computation. Recently, Dolev, Garay, Gilboa and Kolesnikov [Innov. Comput. Sci. (2011), 32–44] considered this problem in the setting of information-theoretic security, showing how to perform such computations on input streams of unbounded length. However, the cost of their solution is exponential in the size of the finite state automaton (FSA) computing the function. In this work we are interested in an efficient (i.e., polynomial time) computation of the above model, at the expens...
This paper studies the design of cryptographic schemes that are secure even if implemented on untrus...
A Statistical Information Theoretic Secure (SITS) system utilizing the Chinese Remainder Theorem (CR...
Consider a network of k parties, each holding a long sequence of n entries (a database), with minimu...
In the problem of swarm computing, n agents wish to securely and distributively perform a computatio...
We consider a distributed computation setting in which a party, whom we refer to as the dealer, has ...
We consider a minimal scenario for secure computation: Parties A and B have private inputs x and y a...
Abstract. Information theoretically secure multi-party computation implies severe communication over...
Secure computation allows mutually distrusting parties to compute over private data. Such collaborat...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We consider the problem of private distributed computation. Our main interest in this problem stems ...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Abstract. We study the following two related questions: – What are the minimal computational resourc...
Traditional approaches to secure computation begin by representing the function $f$ being computed a...
This paper studies the design of cryptographic schemes that are secure even if implemented on untrus...
A Statistical Information Theoretic Secure (SITS) system utilizing the Chinese Remainder Theorem (CR...
Consider a network of k parties, each holding a long sequence of n entries (a database), with minimu...
In the problem of swarm computing, n agents wish to securely and distributively perform a computatio...
We consider a distributed computation setting in which a party, whom we refer to as the dealer, has ...
We consider a minimal scenario for secure computation: Parties A and B have private inputs x and y a...
Abstract. Information theoretically secure multi-party computation implies severe communication over...
Secure computation allows mutually distrusting parties to compute over private data. Such collaborat...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We consider the problem of private distributed computation. Our main interest in this problem stems ...
The need for Cryptography arises out of the following fundamental question: can we perform useful co...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Abstract. We study the following two related questions: – What are the minimal computational resourc...
Traditional approaches to secure computation begin by representing the function $f$ being computed a...
This paper studies the design of cryptographic schemes that are secure even if implemented on untrus...
A Statistical Information Theoretic Secure (SITS) system utilizing the Chinese Remainder Theorem (CR...
Consider a network of k parties, each holding a long sequence of n entries (a database), with minimu...