AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functions) tend to be less efficient than constructions based on specific (e.g., number-theoretic) assumptions. This has prompted a recent line of research aimed at investigating the best possible efficiency of (black-box) cryptographic constructions based on general assumptions. Here, we present bounds on the efficiency of statistically-binding commitment schemes constructed using black-box access to one-way permutations; our bounds are tight for the case of perfectly-binding schemes. Our bounds hold in an extension of the Impagliazzo–Rudich model: we show that any construction beating our bounds would imply the unconditional existence of a one-wa...
We improve the upper bound on the round complexity for perfectly concealing bit commitment schemes b...
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptogra...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Determining the minimal assumptions needed to construct various cryptographic building blocks has be...
It is well-known that one-way permutations (and even one-to-one one-way functions) imply the existen...
Abstract. We present a lower bound on the round complexity of a natural class of black-box construct...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Abstract. We continue the study of the efficiency of black-box reductions in cryptography. We focus ...
International audienceBlack-box separations have been successfully used to identify the limits of a ...
We improve the upper bound on the round complexity for perfectly concealing bit commitment schemes b...
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptogra...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
AbstractConstructions of cryptographic primitives based on general assumptions (e.g., one-way functi...
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and U...
Thesis (Ph. D.)--University of Rochester. Department of Computer Science, 2020.In this thesis we inv...
Since the seminal work of Garg et. al (FOCS\u2713) in which they proposed the first candidate constr...
Determining the minimal assumptions needed to construct various cryptographic building blocks has be...
It is well-known that one-way permutations (and even one-to-one one-way functions) imply the existen...
Abstract. We present a lower bound on the round complexity of a natural class of black-box construct...
For more than 20 years, black-box impossibility results have been used to argue the infeasibility of...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We propose the first black-box construction of non-malleable commitments according to the standard n...
Abstract. We continue the study of the efficiency of black-box reductions in cryptography. We focus ...
International audienceBlack-box separations have been successfully used to identify the limits of a ...
We improve the upper bound on the round complexity for perfectly concealing bit commitment schemes b...
Reducibility between different cryptographic primitives is a fundamental problem in modern cryptogra...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...