Reductions are the common technique to prove security of cryptographic constructions based on a primitive. They take an allegedly successful adversary against the construction and turn it into a successful adversary against the underlying primitive. To a large extent, these reductions are black-box in the sense that they consider the primitive and/or the adversary against the construction only via the input-output behavior, but do not depend on internals like the code of the primitive or of the adversary. Reingold, Trevisan, and Vadhan~(TCC, 2004) provided a widely adopted framework, called the RTV framework from hereon, to classify and relate different notions of black-box reductions. Having precise notions for such reductions is very ...
In [Eurocrypt 2004] Katz and Ostrovsky establish the exact round complexity of secure two-party comp...
In this paper we explore the relation between refinement and reduction, especially as it is used in ...
Cryptographers rely on visualization to effectively communicate cryptographic constructions with one...
International audienceBlack-box separations have been successfully used to identify the limits of a ...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
In this paper, we show that standard model black-box reductions naturally lift to various setup assu...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...
To my darling Ravit The American Heritage dictionary defines the term “Black-Box ” as “A device or t...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
Provable security refers to the ability to give rigorous mathematical proofs towards the security of...
Two main goals of modern cryptography are to identify the minimal assumptions necessary to construct...
Motivated by theoretical and practical interest, the challenging task of designing crypto-graphic pr...
We show that the security of some well-known cryptographic protocols, primitives and assumptions (e...
In [Eurocrypt 2004] Katz and Ostrovsky establish the exact round complexity of secure two-party comp...
In this paper we explore the relation between refinement and reduction, especially as it is used in ...
Cryptographers rely on visualization to effectively communicate cryptographic constructions with one...
International audienceBlack-box separations have been successfully used to identify the limits of a ...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
In this paper, we show that standard model black-box reductions naturally lift to various setup assu...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms...
To my darling Ravit The American Heritage dictionary defines the term “Black-Box ” as “A device or t...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
Provable security refers to the ability to give rigorous mathematical proofs towards the security of...
Two main goals of modern cryptography are to identify the minimal assumptions necessary to construct...
Motivated by theoretical and practical interest, the challenging task of designing crypto-graphic pr...
We show that the security of some well-known cryptographic protocols, primitives and assumptions (e...
In [Eurocrypt 2004] Katz and Ostrovsky establish the exact round complexity of secure two-party comp...
In this paper we explore the relation between refinement and reduction, especially as it is used in ...
Cryptographers rely on visualization to effectively communicate cryptographic constructions with one...