Much of modern cryptography, starting from public-key encryption and going beyond, is based on the hardness of structured (mostly algebraic) problems like factoring, discrete log, or finding short lattice vectors. While structure is perhaps what enables advanced applications, it also puts the hardness of these problems in question. In particular, this structure often puts them in low (and so-called structured) complexity classes such as NP ∩ coNP or statistical zero-knowledge (SZK). Is this structure really necessary? For some cryptographic primitives, such as one-way permutations and homomorphic encryption, we know that the answer is yes-they imply hard problems in NP∩coNP and SZK, respectively. In contrast, one-way functions do not imply ...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
We provide a treatment of encryption and zero-knowledge in terms of uniform complexity measures. Thi...
Can we efficiently compile a computer program P into another one say \tilde{P}, which has the same f...
© International Association for Cryptologic Research 2017. Much of modern cryptography, starting fro...
We construct trapdoor permutations based on (sub-exponential) indistinguishability obfuscation and o...
A program obfuscator takes a program and outputs a “scrambled” version of it, where the goal is that...
There is some evidence that indistinguishability obfuscation (iO) requires either exponentially many...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
The exact hardness of computing a Nash equilibrium is a fundamental open question in algorithmic gam...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
The exact hardness of computing a Nash equilibrium is a fundamental open question in algorithmic gam...
We consider the question of whether PPAD hardness can be based on standard cryptographic assumptions...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
We provide a treatment of encryption and zero-knowledge in terms of uniform complexity measures. Thi...
Can we efficiently compile a computer program P into another one say \tilde{P}, which has the same f...
© International Association for Cryptologic Research 2017. Much of modern cryptography, starting fro...
We construct trapdoor permutations based on (sub-exponential) indistinguishability obfuscation and o...
A program obfuscator takes a program and outputs a “scrambled” version of it, where the goal is that...
There is some evidence that indistinguishability obfuscation (iO) requires either exponentially many...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
The exact hardness of computing a Nash equilibrium is a fundamental open question in algorithmic gam...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
The exact hardness of computing a Nash equilibrium is a fundamental open question in algorithmic gam...
We consider the question of whether PPAD hardness can be based on standard cryptographic assumptions...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
Indistinguishability obfuscation has become one of the most exciting cryptographic primitives due to...
Informally, an obfuscator O is an (efficient, probabilistic) “compiler ” that takes as input a progr...
We provide a treatment of encryption and zero-knowledge in terms of uniform complexity measures. Thi...
Can we efficiently compile a computer program P into another one say \tilde{P}, which has the same f...