International audienceBlack-box separations have been successfully used to identify the limits of a powerful set of tools in cryptography, namely those of black-box reductions. They allow proving that a large set of techniques are not capable of basing one primitive P on another Q. Such separations, however, do not say anything about the power of the combination of primitives Q 1 , Q 2 for constructing P, even if P cannot be based on Q 1 or Q 2 alone. By introducing and formalizing the notion of black-box uselessness, we develop a framework that allows us to make such conclusions. At an informal level, we call primitive Q black-box useless (BBU) for primitive P if Q cannot help constructing P in a black-box way, even in the presence of anot...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
Motivated by theoretical and practical interest, the challenging task of designing crypto-graphic pr...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...
Reductions are the common technique to prove security of cryptographic constructions based on a prim...
Abstract. We continue the study of the efficiency of black-box reductions in cryptography. We focus ...
In [Eurocrypt 2004] Katz and Ostrovsky establish the exact round complexity of secure two-party comp...
In [Eurocrypt 2004] Katz and Ostrovsky establish the exact round complexity of secure two-party comp...
To my darling Ravit The American Heritage dictionary defines the term “Black-Box ” as “A device or t...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
Motivated by theoretical and practical interest, the challenging task of designing crypto-graphic pr...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...
Reductions are the common technique to prove security of cryptographic constructions based on a prim...
Abstract. We continue the study of the efficiency of black-box reductions in cryptography. We focus ...
In [Eurocrypt 2004] Katz and Ostrovsky establish the exact round complexity of secure two-party comp...
In [Eurocrypt 2004] Katz and Ostrovsky establish the exact round complexity of secure two-party comp...
To my darling Ravit The American Heritage dictionary defines the term “Black-Box ” as “A device or t...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...