In this thesis, I broadly explore how we can incorporate program code in cryptography, both in terms of improving existing cryptographic primitives, and in constructing and analyzing completely new primitives. Most classical cryptography models adversaries as a "black-box", meaning that the security argument only uses the input-output behavior of the adversaries, without using their actual code. I show, along the lines of [7], how to use "non-black-box" techniques, using the program code of adversaries to improve constructions of resettably-sound zero-knowledge protocols (RSZK), and to reduce the required security assumption to the minimum possible (one-wayfunctions). I also show how the code of adversaries can be used more directly, to con...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic land-scape by...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landm...
Abstract. The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a m...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
International audienceBlack-box separations have been successfully used to identify the limits of a ...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Over the last decade or so, thanks to remarkable breakthroughs in cryptographic techniques, a wave o...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
Program obfuscation is an exciting new area of research with wide-ranging applications and implicati...
Much of modern cryptography, starting from public-key encryption and going beyond, is based on the h...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic land-scape by...
We examine new ways in which coding theory and cryptography continue to be composed together, and sh...
The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a major landm...
Abstract. The introduction of a non-black-box simulation technique by Barak (FOCS 2001) has been a m...
It is well known that the secure computation of non-trivial functionalities in the setting of no hon...
In this paper, we study the question of whether or not it is possible to construct protocols for gen...
International audienceBlack-box separations have been successfully used to identify the limits of a ...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Over the last decade or so, thanks to remarkable breakthroughs in cryptographic techniques, a wave o...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
Program obfuscation is an exciting new area of research with wide-ranging applications and implicati...
Much of modern cryptography, starting from public-key encryption and going beyond, is based on the h...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
Indistinguishability obfuscation (IO) enables many heretofore out-of-reach applications in cryptogra...
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic land-scape by...