scispace - formally typeset
A

Adam O'Neill

Researcher at University of Massachusetts Amherst

Publications -  66
Citations -  4782

Adam O'Neill is an academic researcher from University of Massachusetts Amherst. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 26, co-authored 62 publications receiving 4386 citations. Previous affiliations of Adam O'Neill include Centrum Wiskunde & Informatica & Boston University.

Papers
More filters
Book ChapterDOI

Multi-input Functional Encryption with Unbounded-Message Security

TL;DR: The techniques are rather generic, and it is hoped they are useful in converting other constructions using differing-inputs obfuscation to ones using sub-exponentially secure indistinguishability obfuscation instead.
Patent

Reducing leakage of information from cryptographic systems

TL;DR: In this paper, a modified secret key collection is used to decrypt a message and the decryption involves providing multiple partial operation results in separate respective steps, which can reduce leakage of meaningful information from cryptographic operations.
Posted Content

Forward-Security under Continual Leakage.

TL;DR: In this article, the authors propose forward security as a second line of defense, so that in the event of full exposure of the current secret key, at least uses of keys prior to this remain secure.
Posted Content

A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.

TL;DR: In this paper, a general construction of deterministic public-key encryption (DE) was proposed, which is designed to provide meaningful security when only source of randomness in the encryption process comes from the message itself.
Journal ArticleDOI

Leakage Resilience from Program Obfuscation

TL;DR: A compiler is presented that transforms any public key encryption or signature scheme to one that is continual leakage resilient with leakage on key updates, assuming indistinguishability obfuscation and under stronger forms of obfuscation, which means the leakage rate tolerated by the compiled scheme is essentially as good as that of the starting scheme.