While cryptographic tools offer practical security and privacy supported by theory and formal proofs, there are often gaps between the theory and intricacies of the real world. This is especially apparent in the realm of game theoretic applications where protocol participants are motivated by incentives and preferences on the protocol outcome. These incentives can lead to additional requirements or unexpected attack vectors, making standard cryptographic concepts inapplicable. The goal of this thesis is to bridge some of the gaps between cryptography and incentive-driven mechanisms. The thesis will consist of three main research threads, each studying the privacy or security of a game-theoretic scenario in non-standard cryptographic f...
peer reviewedVoting is a mechanism of utmost importance to social processes. In this paper, we focus...
In this paper, we describe a decentralized privacy-preserving protocol for securely casting trust ra...
In this thesis, I present the research I conducted with my co-authors on numerous areas of verifiabl...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
Part 7: Privacy-Preserving Data Applications IIInternational audiencePrivacy-preserving data mining ...
Privacy-preserving data mining has been an active research area in recent years due to privacy conce...
Recent work has constructed economic mechanisms that are both truthful and differentially private. I...
Visualizing protocols is not only useful as a step towards understanding and ensuring security prope...
The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizin...
We model the protocol stability and the security of proof-of-work cryptocurrencies using voting game...
For the past three decades, a wide variety of cryptographic protocols have been proposed to solve se...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
Security matters. In the real world, there are various basic mechanisms that provide security. The d...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
peer reviewedVoting is a mechanism of utmost importance to social processes. In this paper, we focus...
In this paper, we describe a decentralized privacy-preserving protocol for securely casting trust ra...
In this thesis, I present the research I conducted with my co-authors on numerous areas of verifiabl...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
Part 7: Privacy-Preserving Data Applications IIInternational audiencePrivacy-preserving data mining ...
Privacy-preserving data mining has been an active research area in recent years due to privacy conce...
Recent work has constructed economic mechanisms that are both truthful and differentially private. I...
Visualizing protocols is not only useful as a step towards understanding and ensuring security prope...
The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizin...
We model the protocol stability and the security of proof-of-work cryptocurrencies using voting game...
For the past three decades, a wide variety of cryptographic protocols have been proposed to solve se...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
International audienceModern e-voting systems deploy cryptographic protocols on a complex infrastruc...
Security matters. In the real world, there are various basic mechanisms that provide security. The d...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
peer reviewedVoting is a mechanism of utmost importance to social processes. In this paper, we focus...
In this paper, we describe a decentralized privacy-preserving protocol for securely casting trust ra...
In this thesis, I present the research I conducted with my co-authors on numerous areas of verifiabl...