S
Stanislaw Jarecki
Researcher at University of California, Irvine
Publications - 111
Citations - 8602
Stanislaw Jarecki is an academic researcher from University of California, Irvine. The author has contributed to research in topics: Password & Encryption. The author has an hindex of 42, co-authored 108 publications receiving 7622 citations. Previous affiliations of Stanislaw Jarecki include Massachusetts Institute of Technology & Stanford University.
Papers
More filters
Book ChapterDOI
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
TL;DR: In order to guarantee the availability and integrity of the secret, this work provides mechanisms to detect maliciously (or accidentally) corrupted shares, as well as mechanisms to secretly recover the correct shares when modification is detected.
Book ChapterDOI
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
David Cash,Stanislaw Jarecki,Charanjit S. Jutla,Hugo Krawczyk,Marcel-Catalin Rosu,Michael Steiner +5 more
TL;DR: This work presents the design and analysis of the first searchable symmetric encryption (SSE) protocol that supports conjunctive search and general Boolean queries on outsourced symmetrically- encrypted data and that scales to very large databases and arbitrarily-structured data including free text search.
Journal ArticleDOI
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
TL;DR: This paper shows that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys, and presents a new protocol which proves to satisfy the security requirements from DKG protocols and ensures a uniform distribution of the generated keys.
Proceedings ArticleDOI
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
David Cash,Joseph Jaeger,Stanislaw Jarecki,Charanjit S. Jutla,Hugo Krawczyk,Marcel-Catalin Rosu,Michael Steiner +6 more
TL;DR: In this article, a dynamic symmetric searchable encryption (SSE) scheme was proposed to search server-held encrypted databases with tens of billions of record-keyword pairs.
Book ChapterDOI
Secure distributed key generation for discrete-log based cryptosystems
TL;DR: A distributed key generation protocol, that achieves optimal resiliency, can be used as a drop-in replacement for key generation modules as well as other components of threshold or proactive discrete-log based cryptosystems.