Advanced Search
DSpace@MIT

Browsing MIT Open Access Articles by Author "Goldwasser, Shafi"

Research and Teaching Output of the MIT Community

Browsing MIT Open Access Articles by Author "Goldwasser, Shafi"

Sort by: Order: Results:

  • Brakerski, Zvika; Goldwasser, Shafi; Kalai, Yael Tauman (Springer Berlin / Heidelberg, 2011-03)
    We show how to achieve public-key encryption schemes that can securely encrypt nonlinear functions of their own secret key. Specifically, we show that for any constant d ∈ ℕ, there exists a public-key encryption scheme ...
  • Goldwasser, Shafi; Lewko, Allison; Wilson, David A. (Springer-Verlag, 2012-03)
    In this work, we show how to construct IBE schemes that are secure against a bounded number of collusions, starting with underlying PKE schemes which possess linear homomorphisms over their keys. In particular, this enables ...
  • Brakerski, Zvika; Goldwasser, Shafi (Springer Berlin / Heidelberg, 2010-08)
    The main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier’s decisional composite residuosity (DCR) assumption), achieve key-dependent message ...
  • Boyle, Elette; Goldwasser, Shafi; Ivan, Ioana (Springer-Verlag Berlin Heidelberg, 2014)
    We introduce two new cryptographic primitives: functional digital signatures and functional pseudorandom functions. In a functional signature scheme, in addition to a master signing key that can be used to sign any ...
  • Boyle, Elette; Goldwasser, Shafi (Spring Berlin/Heidelberg, 2011-01)
    The ability to collectively toss a common coin among n parties in the presence of faults is an important primitive in the arsenal of randomized distributed protocols. In the case of dishonest majority, it was shown to ...
  • Goldwasser, Shafi; Rothblum, Guy N. (Springer-Verlag Berlin Heidelberg, 2013-05)
    An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated program (also a circuit) that has the same input-output functionality as the original program, ...
  • Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N. (Springer-Verlag Berlin Heidelberg, 2011)
    We consider general program obfuscation mechanisms using “somewhat trusted” hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust. Specifically, our solution has ...
  • Goldwasser, Shafi; Kalai, Yael; Peikert, Chris; Vaikuntanathan, Vinod (Tsinghua University Press, 2010-01)
    Starting with the work of Ishai-Sahai-Wagner and Micali-Reyzin, a new goal has been set within the theory of cryptography community, to design cryptographic primitives that are secure against large classes of side-channel ...
  • Goldwasser, Shafi; Rothblum, Guy N. (Springer Berlin / Heidelberg, 2010-08)
    We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded number of executions. Our method uses as a ...
Open Access