scispace - formally typeset
R

Ran Canetti

Researcher at Boston University

Publications -  318
Citations -  41465

Ran Canetti is an academic researcher from Boston University. The author has contributed to research in topics: Cryptography & Cryptographic protocol. The author has an hindex of 83, co-authored 308 publications receiving 38660 citations. Previous affiliations of Ran Canetti include Massachusetts Institute of Technology & Technion – Israel Institute of Technology.

Papers
More filters
Journal ArticleDOI

Lower bounds for sampling algorithms for estimating the average

TL;DR: Lower bounds on the number of sample points and on thenumber of coin tosses used by general sampling algorithms for estimating the average value of functions over a large domain are shown and a non-constructive proof of existence of an algorithm that improves the known upper bounds by a constant factor is given.
Book ChapterDOI

On strong simulation and composable point obfuscation

TL;DR: This work studies a simple relaxation of VBB: Allow the simulator unbounded computation time, while still allowing only polynomially many queries to the oracle, and shows fully composable VGB-obfuscators for point programs under a strong variant of the Decision Diffie Hellman assumption.
Journal Article

Efficient, DoS-resistant, secure key exchange for Internet protocols

TL;DR: Many public-key-based key setup and key agreement protocols already exist and have been implemented for a variety of applications and environments as mentioned in this paper, and several have been proposed for the IPsec protocol, and one, IKE is the current standard.
Proceedings ArticleDOI

Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions

TL;DR: This work constructs the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition, using no trusted set-up or public keys.
Proceedings ArticleDOI

Efficient, DoS-resistant, secure key exchange for internet protocols

TL;DR: JFK is described, a new key exchange protocol primarily designed for use in the IP Security Architecture, which is simple, efficient, and secure; a proof of the latter property is sketched.