scispace - formally typeset
R

Ran Canetti

Researcher at Boston University

Publications -  318
Citations -  41465

Ran Canetti is an academic researcher from Boston University. The author has contributed to research in topics: Cryptography & Cryptographic protocol. The author has an hindex of 83, co-authored 308 publications receiving 38660 citations. Previous affiliations of Ran Canetti include Massachusetts Institute of Technology & Technion – Israel Institute of Technology.

Papers
More filters
Posted Content

Anonymous Collocation Discovery:Taming the Coronavirus While Preserving Privacy

TL;DR: This work proposes an extremely simple scheme for providing fine-grained, reliable and timely alerts to users who have been in the close vicinity of an infected individual, while preserving the anonymity of all individuals, and without collecting or storing any personal information or location history.
Proceedings ArticleDOI

Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model

TL;DR: In this paper, a new type of encryption called functionally equivocal encryption (FEE) was proposed to guarantee security in the face of an adversary that corrupts both parties adaptively, as the computation proceeds.
Posted Content

On adaptive vs. non-adaptive security of multiparty protocols.

TL;DR: This work studies the relations between adaptive security and non-adaptive security, according to two definitions and in several models of computation, and affirming some prevailing beliefs and obtaining some unexpected results.
Proceedings Article

On the Role of Scheduling in Simulation-Based Security

TL;DR: This extended abstract adds a new dimension to the analysis of simulation-based security, namely, the scheduling of concurrent processes, and shows that, when the move from sequential scheduling to task-based nondeterministic scheduling, the same syntactic definition of security gives rise to incomparable semantic notions of security.
Book ChapterDOI

Environmental requirements for authentication protocols

TL;DR: In this article, the authors show how the interaction between a protocol and its environment can have a major effect on a protocol, and demonstrate a number of attacks on published and/or widely used protocols that are not feasible against the protocol running in isolation but become feasible in some application environments.