Security Games: Key Algorithmic Principles, Deployed Applications and Research Challenges
Security is a critical concern around the world, whether it is the challenge of protecting ports, airports and other critical infrastructure, protecting endangered wildlife, forests and fisheries, suppressing urban crime or security in cyberspace. Unfortunately,…
Limitless Worker Surveillance
Efficient, Secure and Private Wide-Area Services in Untrusted Environments
Today, it is common to connect to Internet-based services through a variety of devices. While using the Internet, a user’s information is exposed to untrusted or unreliable environments, from the applications they are using, to…
Efficient, Secure and Private Wide-Area Services in Untrusted Environments
Today, it is common to connect to Internet-based services through a variety of devices. While using the Internet, a user’s information is exposed to untrusted or unreliable environments, from the applications they are using, to…
Opening the world of advanced software technology
By Judith Bishop, Director of Computer Science, Microsoft Research In the world of information technology, the word “open” can mean many different things. For me, it refers to how software is both written and used,…
Charles River Crypto Day: On the Power of Secure Two-Party Computation
Ishai, Kushilevitz, Ostrovsky and Sahai (STOC`07, SIAM JoC 2009) introduced the powerful “MPC-in-the-head” technique that provided a general transformation of information-theoretic MPC protocols secure against passive adversaries to a ZK proof in a “black-box” way.…
Charles River Crypto Day: Three-Round Non-Malleable Commitment from Non-Malleable Codes
We present a new non-malleable commitment protocol. Our protocol has the following features: The protocol has only three rounds of interaction. Pass (TCC 2013) showed an impossibility result for a two-round non-malleable commitment scheme w.r.t.…