Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ben Fisch is active.

Publication


Featured researches published by Ben Fisch.


international cryptology conference | 2014

Physical Zero-Knowledge Proofs of Physical Properties

Ben Fisch; Daniel Freund; Moni Naor

Is it possible to prove that two DNA-fingerprints match, or that they do not match, without revealing any further information about the fingerprints? Is it possible to prove that two objects have the same design without revealing the design itself? In the digital domain, zero-knowledge is an established concept where a prover convinces a verifier of a statement without revealing any information beyond the statement’s validity. However, zero-knowledge is not as well-developed in the context of problems that are inherently physical. In this paper, we are interested in protocols that prove physical properties of physical objects without revealing further information. The literature lacks a unified formal framework for designing and analyzing such protocols. We suggest the first paradigm for formally defining, modeling, and analyzing physical zero-knowledge (PhysicalZK) protocols, using the Universal Composability framework. We also demonstrate applications of physical zero-knowledge to DNA profiling and neutron radiography. Finally, we explore public observation proofs, an analog of public-coin proofs in the context of PhysicalZK.


workshop on internet and network economics | 2017

Socially Optimal Mining Pools

Ben Fisch; Rafael Pass; Abhi Shelat

Mining for Bitcoins is a high-risk high-reward activity. Miners, seeking to reduce their variance and earn steadier rewards, collaborate in so-called pooling strategies where they jointly mine for Bitcoins. Whenever some pool participant is successful, the earned rewards are appropriately split among all pool participants. Currently a dozen of different pooling strategies are in use for Bitcoin mining. We here propose a formal model of utility and social optimality for Bitcoin mining (and analogous mining systems) based on the theory of discounted expected utility, and next study pooling strategies that maximize the utility of participating miners in this model. We focus on pools that achieve a steady-state utility, where the utility per unit of work of all participating miners converges to a common value. Our main result shows that one of the pooling strategies actually employed in practice—the so-called geometric pay pool—achieves the optimal steady-state utility for miners when its parameters are set appropriately. Our results apply not only to Bitcoin mining pools, but any other form of pooled mining or crowdsourcing computations where the participants engage in repeated random trials towards a common goal, and where “partial” solutions can be efficiently verified.


computer and communications security | 2017

IRON: Functional Encryption using Intel SGX

Ben Fisch; Dhinakaran Vinayagamurthy; Dan Boneh; Sergey Gorbunov

Functional encryption (FE) is an extremely powerful cryptographic mechanism that lets an authorized entity compute on encrypted data, and learn the results in the clear. However, all current cryptographic instantiations for general FE are too impractical to be implemented. We construct IRON, a provably secure, and practical FE system using Intels recent Software Guard Extensions (SGX). We show that IRON can be applied to complex functionalities, and even for simple functions, outperforms the best known cryptographic schemes. We argue security by modeling FE in the context of hardware elements, and prove that IRON satisfies the security model.


theory of cryptography conference | 2015

Secure Physical Computation Using Disposable Circuits

Ben Fisch; Daniel Freund; Moni Naor

In a secure physical computation, a set of parties each have physical inputs and jointly compute a function of their inputs in a way that reveals no information to any party except for the output of the function. Recent work in CRYPTO’14 presented examples of physical zero-knowledge proofs of physical properties, a special case of secure physical two-party computation in which one party has a physical input and the second party verifies a boolean function of that input. While the work suggested a general framework for modeling and analyzing physical zero-knowledge protocols, it did not provide a general theory of how to prove any physical property with zero-knowledge. This paper takes an orthogonal approach using disposable circuits (DC)—cheap hardware tokens that can be completely destroyed after a computation—an extension of the familiar tamper-proof token model. In the DC model, we demonstrate that two parties can compute any function of their physical inputs in a way that leaks at most 1 bit of additional information to either party. Moreover, our result generalizes to any multi-party physical computation. Formally, our protocols achieve unconditional UC-security with input-dependent abort.


international cryptology conference | 2018

Verifiable Delay Functions.

Dan Boneh; Joseph Bonneau; Benedikt Bünz; Ben Fisch

We study the problem of building a verifiable delay function (VDF). A \(\text {VDF}\)requires a specified number of sequential steps to evaluate, yet produces a unique output that can be efficiently and publicly verified. \(\text {VDF}\)s have many applications in decentralized systems, including public randomness beacons, leader election in consensus protocols, and proofs of replication. We formalize the requirements for \(\text {VDF}\)s and present new candidate constructions that are the first to achieve an exponential gap between evaluation and verification time.


IACR Cryptology ePrint Archive | 2018

Post-Quantum Group Signatures from Symmetric Primitives.

Dan Boneh; Saba Eskandarian; Ben Fisch


IACR Cryptology ePrint Archive | 2018

Weak Compression and (In)security of Rational Proofs of Storage.

Ben Fisch; Shashwat Silas


IACR Cryptology ePrint Archive | 2018

A Survey of Two Verifiable Delay Functions.

Dan Boneh; Benedikt Bünz; Ben Fisch


IACR Cryptology ePrint Archive | 2018

Tight Proofs of Space and Replication.

Ben Fisch


IACR Cryptology ePrint Archive | 2018

PoReps: Proofs of Space on Useful Data.

Ben Fisch

Collaboration


Dive into the Ben Fisch's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Moni Naor

Weizmann Institute of Science

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sergey Gorbunov

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Abhi Shelat

Northeastern University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge