scispace - formally typeset
R

Ran Canetti

Researcher at Boston University

Publications -  318
Citations -  41465

Ran Canetti is an academic researcher from Boston University. The author has contributed to research in topics: Cryptography & Cryptographic protocol. The author has an hindex of 83, co-authored 308 publications receiving 38660 citations. Previous affiliations of Ran Canetti include Massachusetts Institute of Technology & Technion – Israel Institute of Technology.

Papers
More filters
Posted Content

Adaptively Secure Two-party Computation From Indistinguishability Obfuscation.

TL;DR: The first two-round, two-party general function evaluation protocol that is secure against honest-but-curious adaptive corruption of both parties is presented in this paper. But the protocol is incoercible for one of the parties, and fully leakage tolerant.
Posted Content

Optimal-Rate Non-Committing Encryption in a CRS Model.

TL;DR: A technique for dealing with adversaries that modify the inputs to the protocol adaptively depending on a public key or CRS that contains obfuscated programs, while assuming only standard (polynomial) hardness of the obfuscation mechanism is developed.
Posted Content

Program Obfuscation with Leaky Hardware.

TL;DR: In this article, the authors consider general program obfuscation mechanisms using "somewhat trusted" hardware devices, with the goal of minimizing the usage of the hardware, its complexity, and the required trust.
Posted Content

Universal Composition with Joint State.

TL;DR: A new composition operation is proposed that can handle the case where different components have some amount of joint state and randomness, and it is demonstrated that the new operation turns out to be very useful in a number of quite different scenarios.
Book ChapterDOI

Concurrent Secure Computation with Optimal Query Complexity

TL;DR: This work rules out protocols where the simulator makes only an adversary-independent constant number of ideal queries per session, thus allowing the adversary to potentially fully compromise some sessions of its choice.