Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori bounded polynomial amount of resources (time, space or parallel-time), where the honest algorithms use less resources than the adversaries they are designed to fool. Such primitives were previously studied in the context of time-bounded adversaries (Merkle, CACM 1978), space-bounded adversaries (Cachin and Maurer, CRYPTO 1997) and parallel-time-bounded adversaries (Håstad, IPL 1987). Our goal is come up with fine-grained primitives (in the setting of parallel-time-bounded adversaries) and to show unconditional security of these constructions when possible, or base security on widely believed separation of worst-case complexity classes. We sho...
AbstractA pseudo-random function is a fundamental cryptographic primitive that is essential for encr...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
This paper initiates a study of Fine Grained Secure Computation: i.e. the construction of secure com...
We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract o...
I investigate the extent to which a public source of random bits can be used to obtain some basic cr...
Abstract We study the parallel time-complexity of basic crypto-graphic primitives such as one-way fu...
We present a simple new construction of a pseudorandom bit generator. It stretches a short string of...
A recent work by Nuida and Hanaoka (in ICITS 2009) provided a proof technique for security of inform...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
A weak pseudorandom function (WPRF) is a keyed function fk:{0,1}n→{0,1} such that, for a random key ...
In this work, we study the question of what set of simple-to-state assumptions suffice for construct...
and Luby show that a pseudorandom generator can be constructed from any one-way function. This plaus...
The computational overhead of a cryptographic task is the asymptotic ratio between the computational...
AbstractA pseudo-random function is a fundamental cryptographic primitive that is essential for encr...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
This paper initiates a study of Fine Grained Secure Computation: i.e. the construction of secure com...
We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract o...
I investigate the extent to which a public source of random bits can be used to obtain some basic cr...
Abstract We study the parallel time-complexity of basic crypto-graphic primitives such as one-way fu...
We present a simple new construction of a pseudorandom bit generator. It stretches a short string of...
A recent work by Nuida and Hanaoka (in ICITS 2009) provided a proof technique for security of inform...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
A weak pseudorandom function (WPRF) is a keyed function fk:{0,1}n→{0,1} such that, for a random key ...
In this work, we study the question of what set of simple-to-state assumptions suffice for construct...
and Luby show that a pseudorandom generator can be constructed from any one-way function. This plaus...
The computational overhead of a cryptographic task is the asymptotic ratio between the computational...
AbstractA pseudo-random function is a fundamental cryptographic primitive that is essential for encr...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
In this thesis, we investigate the cost of transforming “weaker” or “less-structured” variants of a ...