• Publications
  • Influence
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
TLDR
This paper shows that by applying the Naor-Yung "double encryption" paradigm, one can combine any KDM-CPA secure scheme with any (ordinary) CCA2 secure scheme, along with an appropriate non-interactive zero-knowledge proof, to obtain a K DM-CCA2 secure schemes. Expand
Ring Signatures of Sub-linear Size Without Random Oracles
TLDR
A variation of the ring signature scheme is offered, where the signer is guaranteed anonymity even if the common reference string is maliciously generated, and an additional feature of this scheme is that it has perfect anonymity. Expand
Position-Based Cryptography
TLDR
This paper turns to Dziembowski's bounded retrieval model (a variant of Maurer's bounded storage model) and formalize and construct information theoretically secure protocols for two fundamental tasks: secure positioning and position-based key exchange and shows how these tasks are in fact universal in this setting. Expand
SecureNN: Efficient and Private Neural Network Training
TLDR
This work provides novel three-party and four-party secure computation protocols for various NN building blocks such as matrix multiplication, Rectified Linear Units, MaxPool, normalization etc, which enables to construct three- party andFour-party information-theoretically secure protocols for training and prediction of CNNs, DNNs and a number of other NN architectures such that no single party learns any information about the data. Expand
SecureNN: 3-Party Secure Computation for Neural Network Training
TLDR
This work provides novel three-party secure computation protocols for various NN building blocks such as matrix multiplication, convolutions, Rectified Linear Units, Maxpool, normalization and so on, which is the first system to provide any security against malicious adversaries for the secure computation of complex algorithms such as neural network inference and training. Expand
Big Data Analytics over Encrypted Datasets with Seabed
TLDR
Seabed uses a novel, additively symmetric homomorphic encryption scheme (ASHE) to perform large-scale aggregations efficiently and introduces a novel randomized encryption scheme called Splayed ASHE, or SPLASHE that can, in certain cases, prevent frequency attacks based on auxiliary data. Expand
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
TLDR
New constructions for UC secure computation using tamper proof hardware (in a stronger model) are presented, which represent an improvement over the results of Katz in several directions using substantially different techniques. Expand
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation
We present EzPC: a secure two-party computation (2PC) framework that generates efficient 2PC protocols from high-level, easyto-write programs. EzPC provides formal correctness and security guaranteesExpand
Position-Based Quantum Cryptography: Impossibility and Constructions
TLDR
It is proved that with the help of sufficient pre-shared entanglement, any non-local quantum computation, i.e., any computation that involves quantum inputs from two parties at different locations, can be performed instantaneously and without any communication, up to local corrections that need to be applied to the outputs. Expand
CrypTFlow: Secure TensorFlow Inference
TLDR
CrypTFlow, a first of its kind system that converts TensorFlow inference code into Secure Multi-party Computation (MPC) protocols at the push of a button, outperforms prior work in the area of secure inference. Expand
...
1
2
3
4
5
...