In the first part of the thesis we show black-box separations in public and private-key cryptography. Our main result answers in the negative the question of whether we can base Identity Based Encryption (IBE) on Trapdoor Permutations. Furthermore, we make progress towards the black-box separation of IBE from the Decisional Diffie-Hellman assumption. We also show the necessity of adaptivity when querying one-way permutations to construct pseudorandom generators a' la Goldreich-Levin; an issue related to streaming models for cryptography. In the second part we introduce streaming techniques in understanding randomness in efficient computation, proving lower bounds for efficiently computable problems, and in computing cryptographic primit...
Over the years, cryptographic research has proposed solutions to many security problems. The securit...
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptogra...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
Abstract. We put forth the question of whether cryptography is fea-sible using streaming devices. We...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give ...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...
The study of monotonicity and negation complexity for Boolean functions has been prevalent in comple...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
Over the years, cryptographic research has proposed solutions to many security problems. The securit...
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptogra...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
Abstract. We put forth the question of whether cryptography is fea-sible using streaming devices. We...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
International audienceWe consider multi-party information-theoretic private protocols, and specifica...
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give ...
We study the round complexity of various cryptographic protocols. Our main result is a tight lower b...
The study of monotonicity and negation complexity for Boolean functions has been prevalent in comple...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
Over the years, cryptographic research has proposed solutions to many security problems. The securit...
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptogra...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...