Provably Weak Instances of Ring-LWE
Denominators of Igusa Class Polynomials
Private computation on encrypted genomic data
Charles River Crypto Day – Building Anonymous Messaging Systems that ‘Hide the Metadata’
Encryption can protect the contents of a message being sent over an open network. In many situations, though, hiding the contents of a communication is not enough: parties to a conversation want to conceal the…
Charles River Crypto Day – The Power of Negations in Cryptography
The study of monotonicity and negation complexity for Boolean functions has been prevalent in complexity theory as well as in computational learning theory, but little attention has been given to it in the cryptographic context.…
Charles River Crypto Day – Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation
We present a constant-round concurrent zero-knowledge protocol for NP. Our protocol relies on the existence of families of collision-resistant hash functions, one-way permutations, and indistinguishability obfuscators for P/poly (with slightly super-polynomial security).
Social Media Platforms and the Curation of Public Culture
Media sociologists have long studied the role that private, commercial media providers play in shaping public culture. It has long been apparent that broadcasters and publishers make choices and assumptions that have consequences for the…