This dissertation concerns the secure processing of distributed data by multi- ple terminals, using interactive public communication among themselves, in order to accomplish a given computational task. In the setting of a probabilistic multitermi- nal source model in which several terminals observe correlated random signals, we analyze secure distributed data processing protocols that harness the correlation in the data. The specific tasks considered are: computing functions of the data under secrecy requirements; generating secretly shared bits with minimal rate of public communication; and securely sharing bits in presence of a querying eavesdropper. In studying these various secure distributed processing tasks, we adopt a unified approac...
© International Association for Cryptologic Research 2015. In this paper we consider the problem of ...
Abstract—We derive single-letter characterizations of (strong) secrecy capacities for models with an...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
This dissertation concerns the secure processing of distributed data by multi-ple terminals, using i...
Abstract—We consider the generation of common randomness (CR), secret or not secret, by two user ter...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
Secure multiparty computation (MPC) addresses the challenge of evaluating functions on secret inputs...
Abstract We investigate the extent to which correlated secret random-ness can help in secure computa...
AbstractRandomness is a useful computation resource due to its ability to enhance the capabilities o...
We revisit A.C. Yao's classic problem of secure function computation by interactive communication, i...
This paper has been presented at : 2018 IEEE International Symposium On Information Theory (ISIT)We ...
Abstract—We study the generation of a secret key of maximum rate by a pair of terminals observing co...
Abstract—In this paper, we investigate how constraints on the randomization in the encoding process ...
Ahlswede R, Csiszár I. Common randomness in information theory and cryptography. Part I: secret shar...
We consider the problem of verifying the security of finitely many sessions of a protocol that toss...
© International Association for Cryptologic Research 2015. In this paper we consider the problem of ...
Abstract—We derive single-letter characterizations of (strong) secrecy capacities for models with an...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
This dissertation concerns the secure processing of distributed data by multi-ple terminals, using i...
Abstract—We consider the generation of common randomness (CR), secret or not secret, by two user ter...
Viewed through the lens of information-theoretic cryptography, almost all nontrivial two-party secur...
Secure multiparty computation (MPC) addresses the challenge of evaluating functions on secret inputs...
Abstract We investigate the extent to which correlated secret random-ness can help in secure computa...
AbstractRandomness is a useful computation resource due to its ability to enhance the capabilities o...
We revisit A.C. Yao's classic problem of secure function computation by interactive communication, i...
This paper has been presented at : 2018 IEEE International Symposium On Information Theory (ISIT)We ...
Abstract—We study the generation of a secret key of maximum rate by a pair of terminals observing co...
Abstract—In this paper, we investigate how constraints on the randomization in the encoding process ...
Ahlswede R, Csiszár I. Common randomness in information theory and cryptography. Part I: secret shar...
We consider the problem of verifying the security of finitely many sessions of a protocol that toss...
© International Association for Cryptologic Research 2015. In this paper we consider the problem of ...
Abstract—We derive single-letter characterizations of (strong) secrecy capacities for models with an...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...