scispace - formally typeset
S

Stanislaw Jarecki

Researcher at University of California, Irvine

Publications -  111
Citations -  8602

Stanislaw Jarecki is an academic researcher from University of California, Irvine. The author has contributed to research in topics: Password & Encryption. The author has an hindex of 42, co-authored 108 publications receiving 7622 citations. Previous affiliations of Stanislaw Jarecki include Massachusetts Institute of Technology & Stanford University.

Papers
More filters
Book ChapterDOI

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

TL;DR: In order to guarantee the availability and integrity of the secret, this work provides mechanisms to detect maliciously (or accidentally) corrupted shares, as well as mechanisms to secretly recover the correct shares when modification is detected.
Book ChapterDOI

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries

TL;DR: This work presents the design and analysis of the first searchable symmetric encryption (SSE) protocol that supports conjunctive search and general Boolean queries on outsourced symmetrically- encrypted data and that scales to very large databases and arbitrarily-structured data including free text search.
Journal ArticleDOI

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems

TL;DR: This paper shows that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys, and presents a new protocol which proves to satisfy the security requirements from DKG protocols and ensures a uniform distribution of the generated keys.
Proceedings ArticleDOI

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation

TL;DR: In this article, a dynamic symmetric searchable encryption (SSE) scheme was proposed to search server-held encrypted databases with tens of billions of record-keyword pairs.
Book ChapterDOI

Secure distributed key generation for discrete-log based cryptosystems

TL;DR: A distributed key generation protocol, that achieves optimal resiliency, can be used as a drop-in replacement for key generation modules as well as other components of threshold or proactive discrete-log based cryptosystems.