Show simple item record

dc.contributor.advisorShafi Goldwasser.en_US
dc.contributor.authorSealfon, Adam Benjamin Gelernter.en_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.en_US
dc.date.accessioned2020-03-09T18:53:03Z
dc.date.available2020-03-09T18:53:03Z
dc.date.copyright2019en_US
dc.date.issued2019en_US
dc.identifier.urihttps://hdl.handle.net/1721.1/124090
dc.descriptionThesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019en_US
dc.descriptionCataloged from PDF version of thesis.en_US
dc.descriptionIncludes bibliographical references (pages 239-249).en_US
dc.description.abstractThe deployment of large-scale systems involving many individuals or devices necessitates the design of computational frameworks that are resilient to failures or malicious actors. This thesis introduces algorithms and definitions for a series of problems concerning robustness, security, and privacy in the many-party setting. We describe protocols for maintaining a stable configuration despite adversarial perturbations, for cryptographic tasks involving secure multiparty computation and anonymity-preserving authentication, and for privacy-preserving analysis of networks. The results presented span the fields of distributed algorithms, cryptography, and differential privacy. We first model and describe a protocol for the problem of robustly preserving a stable population size in the presence of continual adversarial insertions and deletions of agents. Turning to cryptography, we explore the possibility of leveraging an infrastructure for secure multiparty computation, characterizing which networks of pairwise secure computation channels are sufficient to achieve general secure computation among other sets of parties. We next introduce a definitional framework and constructions for ring signatures that provide more fine-grained functionality, explicitly delineating whether parties can convincingly claim or repudiate authorship of a signature. Finally, we turn to differential privacy for graph-structured data. We present efficient algorithms for privately releasing approximate shortest paths and all-pairs distances of a weighted graph while preserving the privacy of the edge weights. We also present efficient node-private algorithms for computing the edge density of Erdős-Rényi and concentrated-degree graphs.en_US
dc.description.statementofresponsibilityby Adam Benjamin Gelernter Sealfon.en_US
dc.format.extent249 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectElectrical Engineering and Computer Science.en_US
dc.titleKeep it secret, keep it safe : privacy, security, and robustness in an adversarial worlden_US
dc.title.alternativePrivacy, security, and robustness in an adversarial worlden_US
dc.typeThesisen_US
dc.description.degreePh. D.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.identifier.oclc1142631941en_US
dc.description.collectionPh.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Scienceen_US
dspace.imported2020-03-09T18:53:02Zen_US
mit.thesis.degreeDoctoralen_US
mit.thesis.departmentEECSen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record