Aleksandr Yampolskiy
Yale University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Aleksandr Yampolskiy.
public key cryptography | 2005
Yevgeniy Dodis; Aleksandr Yampolskiy
We give a simple and efficient construction of a verifiable random function (VRF) on bilinear groups. Our construction is direct. In contrast to prior VRF constructions [14,15], it avoids using an inefficient Goldreich-Levin transformation, thereby saving several factors in security. Our proofs of security are based on a decisional bilinear Diffie-Hellman inversion assumption, which seems reasonable given current state of knowledge. For small message spaces, our VRFs proofs and keys have constant size. By utilizing a collision-resistant hash function, our VRF can also be used with arbitrary message spaces. We show that our scheme can be instantiated with an elliptic group of very reasonable size. Furthermore, it can be made distributed and proactive.
european symposium on research in computer security | 2004
James Aspnes; Joan Feigenbaum; Aleksandr Yampolskiy; Sheng Zhong
We give a formal model for systems that store data in entangled form. We propose a new notion of entanglement, called all-or-nothing integrity (AONI) that binds the users’ data in a way that makes it hard to corrupt the data of any one user without corrupting the data of all users. AONI can be a useful defense against negligent or dishonest storage providers who might otherwise be tempted to discard documents belonging to users without much clout. We show that, if all users use the standard recovery algorithm, we can implement AONI using a MAC, but, if some of the users adopt the adversary’s non-standard recovery algorithm, AONI can no longer be achieved. However, even for the latter scenario, we describe a simple entangling mechanism that provides AONI for a restricted class of destructive adversaries.
Journal of Cryptology | 2015
James Aspnes; Zoë Diamadi; Aleksandr Yampolskiy; Kristian Gjøsteen; Rene C. Peralta
We introduce a new cryptographic primitive called a blind coupon mechanism (BCM). In effect, a BCM is an authenticated bit commitment scheme, which is AND-homomorphic. We show that a BCM has natural and important applications. In particular, we use it to construct a mechanism for transmitting alerts undetectably in a message-passing system of
international conference on the theory and application of cryptology and information security | 2005
James Aspnes; Zoë Diamadi; Kristian Gjøsteen; René Peralta; Aleksandr Yampolskiy
symposium on discrete algorithms | 2005
James Aspnes; Kevin L. Chang; Aleksandr Yampolskiy
n
Theoretical Computer Science | 2007
James Aspnes; Joan Feigenbaum; Aleksandr Yampolskiy; Sheng Zhong
Lecture Notes in Computer Science | 2006
Yevgeniy Dodis; Aleksandr Yampolskiy; Moti Yung
n nodes. Our algorithms allow an alert to quickly propagate to all nodes without its source or existence being detected by an adversary, who controls all message traffic. Our proofs of security are based on a new subgroup escape problem, which seems hard on certain groups with bilinear pairings and on elliptic curves over the ring
IACR Cryptology ePrint Archive | 2006
Yevgeniy Dodis; Aleksandr Yampolskiy; Moti Yung
Efficient cryptographic tools for secure distributed computing | 2006
James Aspnes; Aleksandr Yampolskiy
{\mathbb {Z}}_n
IACR Cryptology ePrint Archive | 2005
James Aspnes; Zoë Diamadi; Kristian Gjøsteen; René Peralta; Aleksandr Yampolskiy