On foundations of public-key encryption and secret sharing

Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019

Détails bibliographiques
Auteur principal: Degwekar, Akshay(Akshay Dhananjai)
Autres auteurs: Vinod Vaikuntanathan.
Format: Thèse
Langue:eng
Publié: Massachusetts Institute of Technology 2020
Sujets:
Accès en ligne:https://hdl.handle.net/1721.1/124060
_version_ 1826205335740743680
author Degwekar, Akshay(Akshay Dhananjai)
author2 Vinod Vaikuntanathan.
author_facet Vinod Vaikuntanathan.
Degwekar, Akshay(Akshay Dhananjai)
author_sort Degwekar, Akshay(Akshay Dhananjai)
collection MIT
description Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019
first_indexed 2024-09-23T13:11:23Z
format Thesis
id mit-1721.1/124060
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T13:11:23Z
publishDate 2020
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/1240602020-03-10T03:15:49Z On foundations of public-key encryption and secret sharing Degwekar, Akshay(Akshay Dhananjai) Vinod Vaikuntanathan. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Electrical Engineering and Computer Science. Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019 Cataloged from PDF version of thesis. Includes bibliographical references (pages 153-164). Since the inception of Cryptography, Information theory and Coding theory have influenced cryptography in myriad ways including numerous information-theoretic notions of security in secret sharing, multiparty computation and statistical zero knowledge; and by providing a large toolbox used extensively in cryptography. This thesis addresses two questions in this realm: Leakage Resilience of Secret Sharing Schemes. We show that classical secret sharing schemes like Shamir secret sharing and additive secret sharing over prime order fields are leakage resilient. Leakage resilience of secret sharing schemes is closely related to locally repairable codes and our results can be viewed as impossibility results for local recovery over prime order fields. As an application of the result, we show the leakage resilience of a variant of the Goldreich-Micali-Wigderson protocol. From Laconic Statistical Zero Knowledge Proofs to Public Key Encryption. Languages with statistical zero knowledge proofs that are also average-case hard have been used to construct various cryptographic primitives. We show that hard languages with laconic SZK proofs, that is proof systems where the communication from the prover to the verifier is small, imply public key encryption. by Akshay Dhananjai Degwekar. Ph. D. Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science 2020-03-09T18:51:36Z 2020-03-09T18:51:36Z 2019 2019 Thesis https://hdl.handle.net/1721.1/124060 1142101291 eng MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. http://dspace.mit.edu/handle/1721.1/7582 166 pages application/pdf Massachusetts Institute of Technology
spellingShingle Electrical Engineering and Computer Science.
Degwekar, Akshay(Akshay Dhananjai)
On foundations of public-key encryption and secret sharing
title On foundations of public-key encryption and secret sharing
title_full On foundations of public-key encryption and secret sharing
title_fullStr On foundations of public-key encryption and secret sharing
title_full_unstemmed On foundations of public-key encryption and secret sharing
title_short On foundations of public-key encryption and secret sharing
title_sort on foundations of public key encryption and secret sharing
topic Electrical Engineering and Computer Science.
url https://hdl.handle.net/1721.1/124060
work_keys_str_mv AT degwekarakshayakshaydhananjai onfoundationsofpublickeyencryptionandsecretsharing