COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Isaac Newton Institute Seminar Series > Cryptography with Work-based Corruptions and the Combinatorics of Anonymity
Cryptography with Work-based Corruptions and the Combinatorics of AnonymityAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Mustapha Amrani. Semantics and Syntax: A Legacy of Alan Turing In the setting of cryptographic protocols, the corruption of a party has been viewed as a simple, uniform and atomic operation, where the adversary decides to get control over a party and this party immediately gets corrupted. In this talk, motivated by the fact that different players may require different resources to get corrupted, we introduce the notion of resource-based corruptions, where the adversary must invest some resources in order to perform corruptions. If the adversary has full information about the system configuration then resource-based corruptions would provide no fundamental difference from the standard corruption model. However, in the `anonymous’ setting (where anonymity is in the sense that such configuration is hidden from the adversary), much is to be gained in terms of efficiency and security. We showcase the power of anonymity in the setting of secure multiparty computation with resource-based corruptions and prove that anonymity can effectively be used to circumvent impossibility results. Regarding efficiency gains, we show that anonymity can be used to force the corruption threshold to drop from 1/2 to 1/3, in turn allowing the use of more efficient cryptographic protocols in various settings. Joint work with Juan Garay, David Johnson (AT&T), Moti Yung (Google). This talk is part of the Isaac Newton Institute Seminar Series series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsMajor Public Lectures in Cambridge Research Seminars - Department of Biochemistry 2009/010 Centre for Family Research 2011 ArchiveOther talksSingle Cell Seminars (October) An Introduction to Cluster Categories of Type A Bioinformatics Measuring interacting electrons in low dimensional systems: spin-charge separation and 'replicas & tbd Developing an optimisation algorithm to supervise active learning in drug discovery SciScreen: Finding Dory The Rise of Augmented Intelligence in Edge Networks Autumn Cactus & Succulent Show Market Socialism and Community Rating in Health Insurance 100 Problems around Scalar Curvature The evolution of photosynthetic efficiency Adaptive auditory cortical coding of speech |