Abstract: Can we provably immunize protocols against coordinated attacks on the internet? Can we verify that computation is performed correctly while preserving the privacy of underlying data? Can we enable mutually distrusting participants to securely compute on distributed private data? These are some of the core challenges that lie at the heart of modern cryptography and secure protocol design.
In this talk, I will discuss my research that builds non-interactive secure protocols to address these challenges based on widely believed cryptographic hardness assumptions.
I... Read More