The idea of protocol security is fundamental in cryptography, and the cryptographic literature is full of different notions of security and different models in which these notions can be achieved. This thesis contains three distinct lines of work, connected by the commonality that the security that they achieve is relevant in today's world of highly interconnected and parallelized networking. Wemake advancements to the well-studied non-malleable and concurrent security models, and in addition we formulate a new security notion of our own called ``topology hiding security.'' Specifically, we give a new protocol for non-malleable commitment, a new model for constant roundconcurrent zero knowledge, and a new multi-party computation protocol...
Traditionally, cryptographic protocols are analyzed in a "stand-alone" setting, where a single proto...
Highly concurrent environments, like the Internet, present new challenges towards design ofsecure cr...
Abstract Concurrent non-malleable zero-knowledge (CNMZK) considers the concurrent execution of zero-...
The idea of protocol security is fundamental in cryptography, and the cryptographic literature is fu...
Topology-hiding communication protocols allow a set of parties, connected by an incomplete network w...
One of the central questions in Cryptography today is proving security of the protocols “on the Inte...
The main aim of cryptography is to provide the frameworks and solutions for information security. Th...
Research on secure multiparty computation has mainly concentrated on the case where the parties can ...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Cryptography today has evolved far beyond its traditional goal of secure message transmission. Throu...
One of the central questions in Cryptography today is proving security of the protocols “on the Inte...
We show unconditionally that the existence of commitment schemes implies the existence of constant-r...
One of the central questions in Cryptography is the design of round-efficient protocols that are sec...
Traditionally, cryptographic protocols are analyzed in a "stand-alone" setting, where a single proto...
Highly concurrent environments, like the Internet, present new challenges towards design ofsecure cr...
Abstract Concurrent non-malleable zero-knowledge (CNMZK) considers the concurrent execution of zero-...
The idea of protocol security is fundamental in cryptography, and the cryptographic literature is fu...
Topology-hiding communication protocols allow a set of parties, connected by an incomplete network w...
One of the central questions in Cryptography today is proving security of the protocols “on the Inte...
The main aim of cryptography is to provide the frameworks and solutions for information security. Th...
Research on secure multiparty computation has mainly concentrated on the case where the parties can ...
In this dissertation, we study the round complexity of cryptographic protocols, giving special atten...
Secure multi-party computation (MPC) is one of the most important primitives in cryptography. Severa...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Cryptography today has evolved far beyond its traditional goal of secure message transmission. Throu...
One of the central questions in Cryptography today is proving security of the protocols “on the Inte...
We show unconditionally that the existence of commitment schemes implies the existence of constant-r...
One of the central questions in Cryptography is the design of round-efficient protocols that are sec...
Traditionally, cryptographic protocols are analyzed in a "stand-alone" setting, where a single proto...
Highly concurrent environments, like the Internet, present new challenges towards design ofsecure cr...
Abstract Concurrent non-malleable zero-knowledge (CNMZK) considers the concurrent execution of zero-...