• Publications
  • Influence
Leakage-Resilient Cryptography
TLDR
A stream-cipher S is constructed whose implementation is secure even if a bounded amount of arbitrary (adversarially chosen) information on the internal state of S is leaked during computation, and a lemma is proved that the output of any PRG has high HILLpseudoentropy even if arbitrary information about the seed is leaked.
Secure Multiparty Computations on Bitcoin
TLDR
The Bit coin system can be used to go beyond the standard "emulation-based" definition of the MPCs, by constructing protocols that link their inputs and the outputs with the real Bit coin transactions.
Proofs of Space
TLDR
Proofs of work (PoW) have been suggested by Dwork and Naor as protection to a shared resource and used to prevent double spending in the Bitcoin digital currency system.
Efficient Multiparty Computations Secure Against an Adaptive Adversary
TLDR
This paper observes that a subprotocol of Rabin and Ben-Or's, known as weak secret sharing (WSS), is not secure against an adaptive adversary, and proposes new and adaptively secure protocols for WSS, VSS and MPC that are substantially more efficient than the original ones.
Intrusion-Resilience Via the Bounded-Storage Model
TLDR
A new method of achieving intrusion-resilience in the cryptographic protocols, based on the results from the Bounded-Storage Model is introduced, namely: session-key generation and entity authentication.
Non-Malleable Codes
TLDR
It is shown that any functionality can be made secure against a large class of tampering attacks, simply by encoding the secret state with a non-malleable code while it is stored in memory.
FairSwap: How To Fairly Exchange Digital Goods
TLDR
FairSwap is introduced -- an efficient protocol for fair exchange of digital goods using smart contracts executed over decentralized cryptocurrencies, where the contract takes the role of an external judge that completes the exchange in case of disagreement.
Leakage-Resilient Cryptography From the Inner-Product Extractor
TLDR
It is shown that the encoding scheme used to store a cryptographic secret such that it remains information theoretically hidden, even given arbitrary continuous leakage from the storage, can be used to protect important cryptographic tasks such as identification, signing and encryption.
Perun: Virtual Payment Hubs over Cryptocurrencies
TLDR
This work introduces Perun, an off-chain channel system that offers a new method for connecting channels that is more efficient than the existing technique of ``routing transactions'' over multiple channels, and formally model and prove security of this technique in the case of one intermediary.
General State Channel Networks
TLDR
The main contribution of this work is to give the first full specification for general state channel networks, and provide formal security definitions and prove the security of the construction against powerful adversaries.
...
1
2
3
4
5
...