On foundations of public-key encryption and secret sharing
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019
Auteur principal: | |
---|---|
Autres auteurs: | |
Format: | Thèse |
Langue: | eng |
Publié: |
Massachusetts Institute of Technology
2020
|
Sujets: | |
Accès en ligne: | https://hdl.handle.net/1721.1/124060 |
_version_ | 1826205335740743680 |
---|---|
author | Degwekar, Akshay(Akshay Dhananjai) |
author2 | Vinod Vaikuntanathan. |
author_facet | Vinod Vaikuntanathan. Degwekar, Akshay(Akshay Dhananjai) |
author_sort | Degwekar, Akshay(Akshay Dhananjai) |
collection | MIT |
description | Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019 |
first_indexed | 2024-09-23T13:11:23Z |
format | Thesis |
id | mit-1721.1/124060 |
institution | Massachusetts Institute of Technology |
language | eng |
last_indexed | 2024-09-23T13:11:23Z |
publishDate | 2020 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/1240602020-03-10T03:15:49Z On foundations of public-key encryption and secret sharing Degwekar, Akshay(Akshay Dhananjai) Vinod Vaikuntanathan. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science Electrical Engineering and Computer Science. Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019 Cataloged from PDF version of thesis. Includes bibliographical references (pages 153-164). Since the inception of Cryptography, Information theory and Coding theory have influenced cryptography in myriad ways including numerous information-theoretic notions of security in secret sharing, multiparty computation and statistical zero knowledge; and by providing a large toolbox used extensively in cryptography. This thesis addresses two questions in this realm: Leakage Resilience of Secret Sharing Schemes. We show that classical secret sharing schemes like Shamir secret sharing and additive secret sharing over prime order fields are leakage resilient. Leakage resilience of secret sharing schemes is closely related to locally repairable codes and our results can be viewed as impossibility results for local recovery over prime order fields. As an application of the result, we show the leakage resilience of a variant of the Goldreich-Micali-Wigderson protocol. From Laconic Statistical Zero Knowledge Proofs to Public Key Encryption. Languages with statistical zero knowledge proofs that are also average-case hard have been used to construct various cryptographic primitives. We show that hard languages with laconic SZK proofs, that is proof systems where the communication from the prover to the verifier is small, imply public key encryption. by Akshay Dhananjai Degwekar. Ph. D. Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science 2020-03-09T18:51:36Z 2020-03-09T18:51:36Z 2019 2019 Thesis https://hdl.handle.net/1721.1/124060 1142101291 eng MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. http://dspace.mit.edu/handle/1721.1/7582 166 pages application/pdf Massachusetts Institute of Technology |
spellingShingle | Electrical Engineering and Computer Science. Degwekar, Akshay(Akshay Dhananjai) On foundations of public-key encryption and secret sharing |
title | On foundations of public-key encryption and secret sharing |
title_full | On foundations of public-key encryption and secret sharing |
title_fullStr | On foundations of public-key encryption and secret sharing |
title_full_unstemmed | On foundations of public-key encryption and secret sharing |
title_short | On foundations of public-key encryption and secret sharing |
title_sort | on foundations of public key encryption and secret sharing |
topic | Electrical Engineering and Computer Science. |
url | https://hdl.handle.net/1721.1/124060 |
work_keys_str_mv | AT degwekarakshayakshaydhananjai onfoundationsofpublickeyencryptionandsecretsharing |