R
Ran Canetti
Researcher at Boston University
Publications - 318
Citations - 41465
Ran Canetti is an academic researcher from Boston University. The author has contributed to research in topics: Cryptography & Cryptographic protocol. The author has an hindex of 83, co-authored 308 publications receiving 38660 citations. Previous affiliations of Ran Canetti include Massachusetts Institute of Technology & Technion – Israel Institute of Technology.
Papers
More filters
Journal ArticleDOI
Lower bounds for sampling algorithms for estimating the average
TL;DR: Lower bounds on the number of sample points and on thenumber of coin tosses used by general sampling algorithms for estimating the average value of functions over a large domain are shown and a non-constructive proof of existence of an algorithm that improves the known upper bounds by a constant factor is given.
Book ChapterDOI
On strong simulation and composable point obfuscation
Nir Bitansky,Ran Canetti +1 more
TL;DR: This work studies a simple relaxation of VBB: Allow the simulator unbounded computation time, while still allowing only polynomially many queries to the oracle, and shows fully composable VGB-obfuscators for point programs under a strong variant of the Decision Diffie Hellman assumption.
Journal Article
Efficient, DoS-resistant, secure key exchange for Internet protocols
William Aiello,Steven M. Bellovin,Matt Blaze,Ran Canetti,John Ioannidis,Angelos D. Keromytis,Omer Reingold +6 more
TL;DR: Many public-key-based key setup and key agreement protocols already exist and have been implemented for a variety of applications and environments as mentioned in this paper, and several have been proposed for the IPsec protocol, and one, IKE is the current standard.
Proceedings ArticleDOI
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
TL;DR: This work constructs the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition, using no trusted set-up or public keys.
Proceedings ArticleDOI
Efficient, DoS-resistant, secure key exchange for internet protocols
William Aiello,Steven M. Bellovin,Matt Blaze,John Ioannidis,Omer Reingold,Ran Canetti,Angelos D. Keromytis +6 more
TL;DR: JFK is described, a new key exchange protocol primarily designed for use in the IP Security Architecture, which is simple, efficient, and secure; a proof of the latter property is sketched.