#### Filter Results:

- Full text PDF available (60)

#### Publication Year

2002

2017

- This year (2)
- Last 5 years (32)
- Last 10 years (54)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Moses Charikar, Eric Lehman, +4 authors Abhi Shelat
- IEEE Transactions on Information Theory
- 2005

This paper addresses the smallest grammar problem: What is the smallest context-free grammar that generates exactly one given string /spl sigma/? This is a natural question about a fundamental object connected to many fields such as data compression, Kolmogorov complexity, pattern identification, and addition chains. Due to the problem's inherent… (More)

- Jan Camenisch, Gregory Neven, Abhi Shelat
- IACR Cryptology ePrint Archive
- 2007

We study an adaptive variant of oblivious transfer in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other, in such a way that (a) the sender learns nothing about the receiver’s selections, and (b) the receiver only learns about the k requested messages. We propose two practical protocols for this… (More)

- Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen
- USENIX Security Symposium
- 2012

The goal of this paper is to assess the feasibility of two-party secure computation in the presence of a malicious adversary. Prior work has shown the feasibility of billion-gate circuits in the semi-honest model, but only the 35k-gate AES circuit in the malicious model, in part because security in the malicious model is much harder to achieve. We show that… (More)

- Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters
- Journal of Cryptology
- 2011

In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slightly homomorphic signatures, or $$P$$ P -homomorphic signatures. With such signatures, it is possible for a third party to derive a signature on the object $$m'$$ m ′ from a… (More)

- Abhi Shelat, Chih-Hao Shen
- IACR Cryptology ePrint Archive
- 2011

We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our approach can enjoy lower communication and computation overhead than methods based on cut-andchoose [13] and lower overhead than methods based on zero-knowledge proofs [8] (or… (More)

- Abhi Shelat, Chih-Hao Shen
- IACR Cryptology ePrint Archive
- 2013

Almost all existing protocols for secure two-party computation require a specific hardness assumption, such as DDH, discrete logarithm, or a random oracle, even after assuming oracle access to the oblivious transfer functionality for their correctness and/or efficiency. We propose and implement a Yao-based protocol that is secure against malicious… (More)

- Benjamin Kreuter, Abhi Shelat, Benjamin Mood, Kevin R. B. Butler
- USENIX Security Symposium
- 2013

A secure computation protocol for a function f (x,y) must leak no information about inputs x,y during its execution; thus it is imperative to compute the function f in a data-oblivious manner. Traditionally, this has been accomplished by compiling f into a boolean circuit. Previous approaches, however, have scaled poorly as the circuit size increases. We… (More)

- Steven Myers, Abhi Shelat
- 2009 50th Annual IEEE Symposium on Foundations of…
- 2009

Under CPA and CCA1 attacks, a secure bit encryption scheme can be applied bit-by-bit to construct a secure many-bit encryption scheme. The same construction fails, however, under a CCA2 attack. In fact, since the notion of CCA2 security was introduced by Rackoff and Simon~\cite{RackoffSi92}, it has been an open question to determine whether single bit CCA2… (More)

- Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan
- Journal of Cryptology
- 2007

We present a positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known impossibility results (Barak et al. in Advances in Cryptology—CRYPTO’01, 2002), for general obfuscation and recent impossibility and implausibility (Goldwasser and Kalai in 46th IEEE Symposium on Foundations of… (More)

- Simson L. Garfinkel, Abhi Shelat
- IEEE Security & Privacy
- 2003

PUBLISHED BY THE IEEE COMPUTER SOCIETY 1540-7993/03/$17.00 © 2003 IEEE IEEE SECURITY & PRIVACY 17 Afundamental goal of information security is to design computer systems that prevent the unauthorized disclosure of confidential information. There are many ways to assure this information privacy. One of the oldest and most common techniques is physical… (More)