D
Daniel Wichs
Researcher at Northeastern University
Publications - 182
Citations - 8972
Daniel Wichs is an academic researcher from Northeastern University. The author has contributed to research in topics: Encryption & Key (cryptography). The author has an hindex of 47, co-authored 171 publications receiving 7727 citations. Previous affiliations of Daniel Wichs include Sapienza University of Rome & Polytechnic University of Catalonia.
Papers
More filters
Proceedings ArticleDOI
Separating succinct non-interactive arguments from all falsifiable assumptions
Craig Gentry,Daniel Wichs +1 more
TL;DR: In this article, it was shown that black-box reductions cannot be used to prove the security of any SNARG construction based on any falsifiable cryptographic assumption, including one-way functions, trapdoor permutations, DDH, RSA, LWE etc.
Book ChapterDOI
Multiparty computation with low communication, computation and interaction via threshold FHE
TL;DR: This work constructs simple multiparty computation protocols secure against fully malicious attackers, tolerating any number of corruptions, and providing security in the universal composability framework.
Book ChapterDOI
Proofs of Retrievability via Hardness Amplification
TL;DR: The main insight of this work comes from a simple connection between PoR schemes and the notion of hardness amplification, and then building nearly optimal PoR codes using state-of-the-art tools from coding and complexity theory.
Book ChapterDOI
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
TL;DR: This work builds an efficient three-round AKA in the Random-Oracle Model, which is resilient to key-leakage attacks that can occur prior-to and after a protocol execution, and allows for repeated "invisible updates" of the secret key, allowing for an unlimited amount of leakage overall.
Book ChapterDOI
Two Round Multiparty Computation via Multi-key FHE
Pratyay Mukherjee,Daniel Wichs +1 more
TL;DR: A general multiparty computation MPC protocol with only two rounds of interaction in the common random string model, which is known to be optimal in the honest-but-curious setting and fully malicious setting, is constructed.