Ryan V Moriarty

Learn More
We consider what constitutes identities in cryptography. Typical examples include your name and your social-security number, or your fingerprint/iris-scan, or your address, or your (non-revoked) publickey coming from some trusted public-key infrastructure. In many situations, however, where you are defines your identity. For example, we know the role of a(More)
We address the problem of realizing concurrently composable secure computation without setup assumptions. While provably impossible in the UC framework of [Can01], Prabhakaran and Sahai had recently suggested a relaxed framework called generalized Environmental Security (gES) [PS04], as well as a restriction of it to a “client-server” setting based on(More)
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a developed key hierarchy and full protocol definitions. This paper examines the correctness and security of the MSA proposal and its corresponding protocols. We utilize Protocol(More)
We present the problem of Oblivious Image Matching, where two parties want to determine whether they have images of the same object or scene, without revealing any additional information. While image matching has attracted a great deal of attention in the computer vision community, it was never treated in a cryptographic sense. In this paper we study the(More)
The IEEE 802.11s standard is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with an interesting key hierarchy and full protocol definitions. This paper proves the correctness and security of the MSA proposal and its corresponding protocols. We also propose and prove(More)
Complete open-talar dislocation irreducible by virtue of entrapment by the tibialis posterior and flexor digitorum longus tendons occurred in a 41-year-old woman. Two-year follow-up examination revealed no evidence of avascular necrosis. A cursory review of the literature suggests that recovery of a complete range of motion is unusual.
Lager-style beers constitute the vast majority of the beer market, and yet, the genetic origin of the yeast strains that brew them has been shrouded in mystery and controversy. Unlike ale-style beers, which are generally brewed with Saccharomyces cerevisiae, lagers are brewed at colder temperatures with allopolyploid hybrids of Saccharomyces eubayanus x S.(More)
In this paper we show a general transformation from any honest verifier statistical zero-knowledge argument to a concurrent statistical zero-knowledge argument. Our transformation relies only on the existence of one-way functions. It is known that the existence of zeroknowledge systems for any non-trivial language implies one way functions. Hence our(More)
In the last decade, the notion of metric embeddings with small distortion has received wide attention in the literature, with applications in combinatorial optimization, discrete mathematics, and bio-informatics. The notion of embedding is, given two metric spaces on the same number of points, to find a bijection that minimizes maximum Lipschitz and(More)
BACKGROUND Lignocellulosic biomass is a common resource across the globe, and its fermentation offers a promising option for generating renewable liquid transportation fuels. The deconstruction of lignocellulosic biomass releases sugars that can be fermented by microbes, but these processes also produce fermentation inhibitors, such as aromatic acids and(More)