The computational treatment of cryptography, and indeed any scientific treatment of a problem, is marked by its definitional side and by it constructive side. Results in this thesis better our understanding of both: on one side, they characterize the extent to which computational definitions capture the security of the basic task of symmetric encryption; on the other, they provide explicit bounds on the efficiency of commitment and secure two-party computation constructions. Specifically: - We relate the formal and computational treatments of symmetric encryption, obtaining a precise characterization of computational schemes whose computational semantics imply their formal semantics. We prove that this characterization is strictly weaker...
Abstract. We study the following two related questions: – What are the minimal computational resourc...
In this work we consider the following question: What is the cost of security for multi-party protoc...
Thesis: S.M., Massachusetts Institute of Technology, School of Architecture and Planning, Program in...
Secure computation involves multiple parties computing a common function while keeping their inputs ...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
This thesis contributes two results to the research area of secure two-party computation. The first ...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Secure computation is a fundamental problem in modern cryptography in which multiple parties join to...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
2016 - 2017A cryptographic protocol is defined by the behaviour of the involved parties and the mess...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
<p>This doctoral dissertation presents contributions advancing the state-of-the-art of secure two-pa...
We study the following two related questions: - What are the minimal computational resources require...
Abstract. We study the following two related questions: – What are the minimal computational resourc...
In this work we consider the following question: What is the cost of security for multi-party protoc...
Thesis: S.M., Massachusetts Institute of Technology, School of Architecture and Planning, Program in...
Secure computation involves multiple parties computing a common function while keeping their inputs ...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
This thesis contributes two results to the research area of secure two-party computation. The first ...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Secure computation is a fundamental problem in modern cryptography in which multiple parties join to...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
2016 - 2017A cryptographic protocol is defined by the behaviour of the involved parties and the mess...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
<p>This doctoral dissertation presents contributions advancing the state-of-the-art of secure two-pa...
We study the following two related questions: - What are the minimal computational resources require...
Abstract. We study the following two related questions: – What are the minimal computational resourc...
In this work we consider the following question: What is the cost of security for multi-party protoc...
Thesis: S.M., Massachusetts Institute of Technology, School of Architecture and Planning, Program in...