Skip to main content

and
  1. Chapter and Conference Paper

    Purely Rational Secret Sharing (Extended Abstract)

    Rational secret sharing is a problem at the intersection of cryptography and game theory. In essence, a dealer wishes to engineer a communication game that, when rationally played, guarantees that each of the ...

    Silvio Micali, abhi shelat in Theory of Cryptography (2009)

  2. Chapter and Conference Paper

    Verifiably Secure Devices

    We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices

    Sergei Izmalkov, Matt Lepinski, Silvio Micali in Theory of Cryptography (2008)

  3. Chapter and Conference Paper

    Online-Untransferable Signatures

    Non-transferability of digital signatures is an important security concern, traditionally achieved via interactive verification protocols. Such protocols, however, are vulnerable to “online transfer attacks” —...

    Moses Liskov, Silvio Micali in Public Key Cryptography – PKC 2008 (2008)

  4. Chapter and Conference Paper

    Fair-Zero Knowledge

    We introduce Fair Zero-Knowledge, a multi-verifier ZK system where every proof is guaranteed to be “zero-knowledge for all verifiers.” That is, if an honest verifier accepts a fair zero-knowledge proof, then he i...

    Matt Lepinski, Silvio Micali, Abhi Shelat in Theory of Cryptography (2005)

  5. Chapter and Conference Paper

    Optimal Error Correction Against Computationally Bounded Noise

    For computationally bounded adversarial models of error, we construct appealingly simple, efficient, cryptographic encoding and unique decoding schemes whose error-correction capability is much greater than cl...

    Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson in Theory of Cryptography (2005)

  6. Chapter and Conference Paper

    Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering

    Traditionally, secure cryptographic algorithms provide security against an adversary who has only black-box access to the secret information of honest parties. However, such models are not always adequate. In par...

    Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali in Theory of Cryptography (2004)

  7. Chapter and Conference Paper

    Physically Observable Cryptography

    Complexity-theoretic cryptography considers only abstract notions of computation, and hence cannot protect against attacks that exploit the information leakage (via electromagnetic fields, power consumption, e...

    Silvio Micali, Leonid Reyzin in Theory of Cryptography (2004)

  8. No Access

    Chapter and Conference Paper

    Fractal Merkle Tree Representation and Traversal

    We introduce a technique for traversal of Merkle trees, and propose an efficient algorithm that generates a sequence of leaves along with their associated authentication paths. For one choice of parameters, an...

    Markus Jakobsson, Tom Leighton, Silvio Micali in Topics in Cryptology — CT-RSA 2003 (2003)