Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aleksandr Yampolskiy is active.

Publication


Featured researches published by Aleksandr Yampolskiy.


public key cryptography | 2005

A verifiable random function with short proofs and keys

Yevgeniy Dodis; Aleksandr Yampolskiy

We give a simple and efficient construction of a verifiable random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [14,15], it avoids using an inefficient Goldreich-Levin transformation, thereby saving several factors in security. Our proofs of security are based on a decisional bilinear Diffie-Hellman inversion assumption, which seems reasonable given current state of knowledge. For small message spaces, our VRFs proofs and keys have constant size. By utilizing a collision-resistant hash function, our VRF can also be used with arbitrary message spaces. We show that our scheme can be instantiated with an elliptic group of very reasonable size. Furthermore, it can be made distributed and proactive.


european symposium on research in computer security | 2004

Towards a Theory of Data Entanglement

James Aspnes; Joan Feigenbaum; Aleksandr Yampolskiy; Sheng Zhong

We give a formal model for systems that store data in entangled form. We propose a new notion of entanglement, called all-or-nothing integrity (AONI) that binds the users’ data in a way that makes it hard to corrupt the data of any one user without corrupting the data of all users. AONI can be a useful defense against negligent or dishonest storage providers who might otherwise be tempted to discard documents belonging to users without much clout. We show that, if all users use the standard recovery algorithm, we can implement AONI using a MAC, but, if some of the users adopt the adversary’s non-standard recovery algorithm, AONI can no longer be achieved. However, even for the latter scenario, we describe a simple entangling mechanism that provides AONI for a restricted class of destructive adversaries.


Journal of Cryptology | 2015

Spreading Alerts Quietly and the Subgroup Escape Problem

James Aspnes; Zoë Diamadi; Aleksandr Yampolskiy; Kristian Gjøsteen; Rene C. Peralta

We introduce a new cryptographic primitive called a blind coupon mechanism (BCM). In effect, a BCM is an authenticated bit commitment scheme, which is AND-homomorphic. We show that a BCM has natural and important applications. In particular, we use it to construct a mechanism for transmitting alerts undetectably in a message-passing system of


international conference on the theory and application of cryptology and information security | 2005

Spreading alerts quietly and the subgroup escape problem

James Aspnes; Zoë Diamadi; Kristian Gjøsteen; René Peralta; Aleksandr Yampolskiy


symposium on discrete algorithms | 2005

Inoculation strategies for victims of viruses and the sum-of-squares partition problem

James Aspnes; Kevin L. Chang; Aleksandr Yampolskiy

n


Theoretical Computer Science | 2007

Towards a theory of data entanglement

James Aspnes; Joan Feigenbaum; Aleksandr Yampolskiy; Sheng Zhong


Lecture Notes in Computer Science | 2006

Threshold and proactive pseudo-random permutations

Yevgeniy Dodis; Aleksandr Yampolskiy; Moti Yung

n nodes. Our algorithms allow an alert to quickly propagate to all nodes without its source or existence being detected by an adversary, who controls all message traffic. Our proofs of security are based on a new subgroup escape problem, which seems hard on certain groups with bilinear pairings and on elliptic curves over the ring


IACR Cryptology ePrint Archive | 2006

Threshold and Proactive Pseudo-Random Permutations.

Yevgeniy Dodis; Aleksandr Yampolskiy; Moti Yung


Efficient cryptographic tools for secure distributed computing | 2006

Efficient cryptographic tools for secure distributed computing

James Aspnes; Aleksandr Yampolskiy

{\mathbb {Z}}_n


IACR Cryptology ePrint Archive | 2005

Spreading Alerts Quietly and the Subgroup Escape Problem.

James Aspnes; Zoë Diamadi; Kristian Gjøsteen; René Peralta; Aleksandr Yampolskiy

Collaboration


Dive into the Aleksandr Yampolskiy's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kristian Gjøsteen

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

René Peralta

University of Wisconsin–Milwaukee

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rene C. Peralta

National Institute of Standards and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge