scispace - formally typeset
D

Daniel Wichs

Researcher at Northeastern University

Publications -  182
Citations -  8972

Daniel Wichs is an academic researcher from Northeastern University. The author has contributed to research in topics: Encryption & Key (cryptography). The author has an hindex of 47, co-authored 171 publications receiving 7727 citations. Previous affiliations of Daniel Wichs include Sapienza University of Rome & Polytechnic University of Catalonia.

Papers
More filters
Proceedings ArticleDOI

Separating succinct non-interactive arguments from all falsifiable assumptions

TL;DR: In this article, it was shown that black-box reductions cannot be used to prove the security of any SNARG construction based on any falsifiable cryptographic assumption, including one-way functions, trapdoor permutations, DDH, RSA, LWE etc.
Book ChapterDOI

Multiparty computation with low communication, computation and interaction via threshold FHE

TL;DR: This work constructs simple multiparty computation protocols secure against fully malicious attackers, tolerating any number of corruptions, and providing security in the universal composability framework.
Book ChapterDOI

Proofs of Retrievability via Hardness Amplification

TL;DR: The main insight of this work comes from a simple connection between PoR schemes and the notion of hardness amplification, and then building nearly optimal PoR codes using state-of-the-art tools from coding and complexity theory.
Book ChapterDOI

Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model

TL;DR: This work builds an efficient three-round AKA in the Random-Oracle Model, which is resilient to key-leakage attacks that can occur prior-to and after a protocol execution, and allows for repeated "invisible updates" of the secret key, allowing for an unlimited amount of leakage overall.
Book ChapterDOI

Two Round Multiparty Computation via Multi-key FHE

TL;DR: A general multiparty computation MPC protocol with only two rounds of interaction in the common random string model, which is known to be optimal in the honest-but-curious setting and fully malicious setting, is constructed.