Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Adaptively Secure MPC with Sublinear Communication Complexity

    A central challenge in the study of MPC is to balance between security guarantees, hardness assumptions, and resources required for the protocol. In this work, we study the cost of tolerating adaptive corrupti...

    Ran Cohen, Abhi Shelat, Daniel Wichs in Journal of Cryptology (2023)

  2. No Access

    Article

    Multiparty Generation of an RSA Modulus

    We present a new multiparty protocol for the distributed generation of biprime RSA moduli, with security against any subset of maliciously colluding parties assuming oblivious transfer and the hardness of fact...

    Megan Chen, Jack Doerner, Yashvanth Kondi, Eysa Lee in Journal of Cryptology (2022)

  3. No Access

    Chapter and Conference Paper

    Guaranteed Output in \(O(\sqrt{n})\) Rounds for Round-Robin Sampling Protocols

    We introduce a notion of round-robin secure sampling that captures several protocols in the literature, such as the “powers-of-tau” setup protocol for pairing-based polynomial commitments and zk-SNARKs, and certa...

    Ran Cohen, Jack Doerner, Yashvanth Kondi in Advances in Cryptology – EUROCRYPT 2022 (2022)

  4. No Access

    Chapter and Conference Paper

    Improved Straight-Line Extraction in the Random Oracle Model with Applications to Signature Aggregation

    The goal of this paper is to improve the efficiency and applicability of straightline extraction techniques in the random oracle model. Straightline extraction in the random oracle model refers to the existence o...

    Yashvanth Kondi, Abhi Shelat in Advances in Cryptology – ASIACRYPT 2022 (2022)

  5. Chapter and Conference Paper

    Multiparty Generation of an RSA Modulus

    We present a new multiparty protocol for the distributed generation of biprime RSA moduli, with security against any subset of maliciously colluding parties assuming oblivious transfer and the hardness of fact...

    Megan Chen, Ran Cohen, Jack Doerner in Advances in Cryptology – CRYPTO 2020 (2020)

  6. Chapter and Conference Paper

    Going Beyond Dual Execution: MPC for Functions with Efficient Verification

    The dual execution paradigm of Mohassel and Franklin (PKC’06) and Huang, Katz and Evans (IEEE ’12) shows how to achieve the notion of 1-bit leakage security at roughly twice the cost of semi-honest security for t...

    Carmit Hazay, Abhi Shelat in Public-Key Cryptography – PKC 2020 (2020)

  7. No Access

    Chapter and Conference Paper

    Adaptively Secure MPC with Sublinear Communication Complexity

    A central challenge in the study of MPC is to balance between security guarantees, hardness assumptions, and resources required for the protocol

    Ran Cohen, Abhi Shelat, Daniel Wichs in Advances in Cryptology – CRYPTO 2019 (2019)

  8. No Access

    Chapter and Conference Paper

    Minimizing Trust in Hardware Wallets with Two Factor Signatures

    We introduce the notion of two-factor signatures (2FS), a generalization of a two-out-of-two threshold signature scheme in which one of the parties is a hardware token which can store a high-entropy secret, and ...

    Antonio Marcedone, Rafael Pass, Abhi Shelat in Financial Cryptography and Data Security (2019)

  9. Chapter and Conference Paper

    Multi-Key Searchable Encryption, Revisited

    We consider a setting where users store their encrypted documents on a remote server and can selectively share documents with each other. A user should be able to perform keyword searches over all the document...

    Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs in Public-Key Cryptography – PKC 2018 (2018)

  10. No Access

    Chapter and Conference Paper

    Socially Optimal Mining Pools

    Mining for Bitcoins is a high-risk high-reward activity. Miners, seeking to reduce their variance and earn steadier rewards, collaborate in so-called pooling strategies where they jointly mine for Bitcoins. Whene...

    Ben Fisch, Rafael Pass, Abhi Shelat in Web and Internet Economics (2017)

  11. Chapter and Conference Paper

    Analysis of the Blockchain Protocol in Asynchronous Networks

    Nakamoto’s famous blockchain protocol enables achieving consensus in a so-called permissionless setting—anyone can join (or leave) the protocol execution, and the protocol instructions do not depend on the identi...

    Rafael Pass, Lior Seeman, Abhi Shelat in Advances in Cryptology – EUROCRYPT 2017 (2017)

  12. No Access

    Chapter and Conference Paper

    Bounded KDM Security from iO and OWF

    To date, all constructions in the standard model (i.e., without random oracles) of Bounded Key-Dependent Message (KDM) secure (or even just circularly-secure) encryption schemes rely on specific assumptions (L...

    Antonio Marcedone, Rafael Pass, Abhi Shelat in Security and Cryptography for Networks (2016)

  13. Chapter and Conference Paper

    Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings

    A celebrated result by Barak et al. (Crypto’01) shows the impossibility of general-purpose virtual black-box (VBB) obfuscation in the plain model. A recent work by Canetti, Kalai, and Paneth (TCC’15) extends this...

    Rafael Pass, Abhi Shelat in Theory of Cryptography (2016)

  14. Chapter and Conference Paper

    Lower Bounds on Assumptions Behind Indistinguishability Obfuscation

    Since the seminal work of Garg et al. (FOCS’13) in which they proposed the first candidate construction for indistinguishability obfuscation (iO for short), iO has become a central cryptographic primitive with...

    Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass in Theory of Cryptography (2016)

  15. Article

    Computing on Authenticated Data

    In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slightly homomorphic signatures, or ...

    Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger in Journal of Cryptology (2015)

  16. Chapter and Conference Paper

    Secure Computation from Millionaire

    The standard method for designing a secure computation protocol for function f first transforms f into either a circuit or a RAM program and then applies a generic secure computation protocol that either handles ...

    Abhi Shelat in Advances in Cryptology -- ASIACRYPT 2015 (2015)

  17. Chapter and Conference Paper

    Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead

    We present a 2-round protocol to prove knowledge of a plaintext corresponding to a given ciphertext. Our protocol is black-box in the underlying cryptographic primitives and it can be instantiated with almost ...

    Steven Myers, Mona Sergi, abhi shelat in Theory of Cryptography (2013)

  18. No Access

    Chapter and Conference Paper

    Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness

    We construct an NM − CCA1 encryption scheme from any CCA1 encryption scheme that is also plaintext aware and weakly simulatable. We believe this is the first construction of a NM − CCA1 scheme that follows strict...

    Steven Myers, Mona Sergi, abhi shelat in Security and Cryptography for Networks (2012)

  19. Chapter and Conference Paper

    Computing on Authenticated Data

    In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slightly homomorphic signatures, or P-h...

    Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger in Theory of Cryptography (2012)

  20. Article

    Securely Obfuscating Re-Encryption

    We present a positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known impossibility results (Barak et al. in Advances in Cryptology—CRYPT...

    Susan Hohenberger, Guy N. Rothblum, Abhi Shelat in Journal of Cryptology (2011)

previous disabled Page of 2