scispace - formally typeset
R

Ran Canetti

Researcher at Boston University

Publications -  318
Citations -  41465

Ran Canetti is an academic researcher from Boston University. The author has contributed to research in topics: Cryptography & Cryptographic protocol. The author has an hindex of 83, co-authored 308 publications receiving 38660 citations. Previous affiliations of Ran Canetti include Massachusetts Institute of Technology & Technion – Israel Institute of Technology.

Papers
More filters
Book ChapterDOI

Exposure-resilient functions and all-or-nothing transforms

TL;DR: This work shows how to build cryptographic primitives that remain secure even when an adversary is able to learn almost all of the secret key, and uses the (generalized) notion of an All-Or-Nothing Transform (AONT), an invertible (randomized) transformation T which reveals "no information" about x even if almost all the bits of T(x) are known.
Book ChapterDOI

On the limitations of universally composable two-party computation without set-up assumptions

TL;DR: The feasibility of universally composable two-party function evaluation in the plain model is studied and it is shown that very few functions can be computed in this model so as to provide the UC security guarantees.

Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction

TL;DR: This document introduces Timed Efficient Stream Loss-tolerant Authentication (TESLA), which allows all receivers to check the integrity and authenticate the source of each packet in multicast or broadcast data streams.
Proceedings Article

An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack

TL;DR: In this article, the authors proposed a simple threshold public-key cryptosystem (PKC) which is secure against adaptive chosen ciphertext attack, under the Decisional Diffie-Hellman (DDH) intractability assumption.
Posted Content

Security Analysis of IKE's Signature-based Key-Exchange Protocol.

TL;DR: In this paper, the authors present a security analysis of the Diffie-Hellman key-exchange protocol authenticated with digital signatures used by the Internet Key Exchange (IKE) standard, based on an adaptation of the key exchange model from Eurocrypt'01 to the setting where peers identities are not necessarily known or disclosed from the start of the protocol.