Consider the following problem: You have a device that is supposed to compute a linear combination of its inputs, which are taken from some finite field. However, the device may be faulty and compute arbitrary functions of its inputs. Is it possible to encode the inputs in such a way that only linear functions can be evaluated over the encodings? I.e., learning an arbitrary function of the encodings will not reveal more information about the inputs than a linear combination. In this work, we introduce the notion of algebraic restriction codes (AR codes), which constrain adversaries who might compute any function to computing a linear function. Our main result is an information-theoretic construction AR codes that restrict any class of func...
Consider an abstract storage device Σ(G) that can hold a single element x from a fixed, publicl...
Abstract. We show a technique to transform a linearly-homomorphic encryption into a homomorphic encr...
Oblivious Linear Evaluation (OLE) is the arithmetic analogue of the well-know oblivious transfer pri...
Consider the following problem: You have a device that is supposed to compute a linear combination o...
We consider the secure computation problem in a minimal model, where Alice and Bob each holds an inp...
BUG REPORT: In early 2021 we were made aware of a bug in Lemma 9.1 by Carmit Hazay, Muthu Venkitasu...
We introduce a new approach to actively secure two-party computation based on so-called oblivious li...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes....
This thesis is devoted to applying symbolic methods to the problems of decoding linear codes and of ...
We present a new method that produces bounded FHE schemes (see Definition 3), starting with encrypti...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
A code-based cryptosystem is considered secure if the best known attack against it is information-se...
In this thesis, we study four notions related to Private Information Retrieval (PIR), namely Extend...
Whether it is online commerce, international relations, or simply through email communication, the e...
Consider an abstract storage device Σ(G) that can hold a single element x from a fixed, publicl...
Abstract. We show a technique to transform a linearly-homomorphic encryption into a homomorphic encr...
Oblivious Linear Evaluation (OLE) is the arithmetic analogue of the well-know oblivious transfer pri...
Consider the following problem: You have a device that is supposed to compute a linear combination o...
We consider the secure computation problem in a minimal model, where Alice and Bob each holds an inp...
BUG REPORT: In early 2021 we were made aware of a bug in Lemma 9.1 by Carmit Hazay, Muthu Venkitasu...
We introduce a new approach to actively secure two-party computation based on so-called oblivious li...
This thesis discusses new results in two areas within cryptography; securely transmitting a message ...
This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes....
This thesis is devoted to applying symbolic methods to the problems of decoding linear codes and of ...
We present a new method that produces bounded FHE schemes (see Definition 3), starting with encrypti...
A large part in the design of secure cryptographic primitives consists in identifying hard algorithm...
A code-based cryptosystem is considered secure if the best known attack against it is information-se...
In this thesis, we study four notions related to Private Information Retrieval (PIR), namely Extend...
Whether it is online commerce, international relations, or simply through email communication, the e...
Consider an abstract storage device Σ(G) that can hold a single element x from a fixed, publicl...
Abstract. We show a technique to transform a linearly-homomorphic encryption into a homomorphic encr...
Oblivious Linear Evaluation (OLE) is the arithmetic analogue of the well-know oblivious transfer pri...