Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Brett Hemenway is active.

Publication


Featured researches published by Brett Hemenway.


international conference on the theory and application of cryptology and information security | 2011

Lossy encryption: constructions from general assumptions and efficient selective opening chosen ciphertext security

Brett Hemenway; Benoît Libert; Rafail Ostrovsky; Damien Vergnaud

Lossy encryption was originally studied as a means of achieving efficient and composable oblivious transfer. Bellare, Hofheinz and Yilek showed that lossy encryption is also selective opening secure. We present new and general constructions of lossy encryption schemes and of cryptosystems secure against selective opening adversaries. We show that every re-randomizable encryption scheme gives rise to efficient encryptions secure against a selective opening adversary. We show that statistically-hiding 2-round Oblivious Transfer implies Lossy Encryption and so do smooth hash proof systems. This shows that private information retrieval and homomorphic encryption both imply Lossy Encryption, and thus Selective Opening Secure Public Key Encryption. Applying our constructions to well-known cryptosystems, we obtain selective opening secure commitments and encryptions from the Decisional Diffie-Hellman, Decisional Composite Residuosity and Quadratic Residuosity assumptions. In an indistinguishability-based model of chosen-ciphertext selective opening security, we obtain secure schemes featuring short ciphertexts under standard number theoretic assumptions. In a simulation-based definition of chosen-ciphertext selective opening security, we also handle non-adaptive adversaries by adapting the Naor-Yung paradigm and using the perfect zero-knowledge proofs of Groth, Ostrovsky and Sahai.


international cryptology conference | 2016

Adaptively Secure Garbled Circuits from One-Way Functions

Brett Hemenway; Zahra Jafargholi; Rafail Ostrovsky; Alessandra Scafuro; Daniel Wichs

A garbling scheme is used to garble a circuit C and an input x in a way that reveals the output Cx but hides everything else. In many settings, the circuit can be garbled off-line without strict efficiency constraints, but the input must be garbled very efficiently on-line, with much lower complexity than evaluating the circuit. Yaos garbling schemei?ź[31] has essentially optimal on-line complexity, but only achieves selective security, where the adversary must choose the input x prior to seeing the garbled circuit. It has remained an open problem to achieve adaptive security, where the adversary can choose x after seeing the garbled circuit, while preserving on-line efficiency. In this work, we modify Yaos scheme in a way that allows us to prove adaptive security under one-way functions. In our main instantiation we achieve on-line complexity only proportional to the width w of the circuit. Alternatively we can also get an instantiation with on-line complexity only proportional to the depth d and the output size of the circuit, albeit incurring in a


international cryptology conference | 2008

Public-Key Locally-Decodable Codes

Brett Hemenway; Rafail Ostrovsky


information theory and applications | 2012

Recovering simple signals

Anna C. Gilbert; Brett Hemenway; Atri Rudra; M. Strauss; Mary Wootters

2^{Od}


international conference on the theory and application of cryptology and information security | 2013

Building Lossy Trapdoor Functions from Lossy Encryption

Brett Hemenway; Rafail Ostrovsky


public key cryptography | 2012

On homomorphic encryption and chosen-ciphertext security

Brett Hemenway; Rafail Ostrovsky

security loss in our reduction. More broadly, we relate the on-line complexity of adaptively secure garbling schemes in our framework to a certain type of pebble complexity of the circuit. As our maini?źtool, of independent interest, we develop a new notion of somewhere equivocal encryption, which allows us to efficiently equivocate on a small subset of the message bits.


theory of cryptography conference | 2015

Non-committing Encryption from Φ-hiding

Brett Hemenway; Rafail Ostrovsky; Alon Rosen

In this paper we introduce the notion of a Public-Key Encryption Scheme that is also a Locally-Decodable Error-Correcting Code (PKLDC). In particular, we allow any polynomial-time adversary to read the entire ciphertext, and corrupt a constant fraction of the bits of the entireciphertext. Nevertheless, the decoding algorithm can recover any bit of the plaintext with all but negligible probability by reading only a sublinear number of bits of the (corrupted) ciphertext. We give a general construction of a PKLDC from any Semantically-Secure Public Key Encryption (SS-PKE) and any Private Information Retrieval (PIR) protocol. Since Homomorphic encryption implies PIR, we also show a reduction from any Homomorphic encryption protocol to PKLDC. Applying our construction to the best known PIR protocol (that of Gentry and Ramzan), we obtain a PKLDC, which for messages of size nand security parameter kachieves ciphertexts of size


international colloquium on automata, languages and programming | 2015

Linear-Time List Recovery of High-Rate Expander Codes

Brett Hemenway; Mary Wootters

\mathcal{O}(n)


international workshop and international workshop on approximation randomization and combinatorial optimization algorithms and techniques | 2011

Public key locally decodable codes with short keys

Brett Hemenway; Rafail Ostrovsky; M. Strauss; Mary Wootters

, public key of size


foundations of computer science | 2017

Local List Recovery of High-Rate Tensor Codes & Applications

Brett Hemenway; Noga Ron-Zewi; Mary Wootters

\mathcal{O}(n+k)

Collaboration


Dive into the Brett Hemenway's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

M. Strauss

University of Michigan

View shared research outputs
Top Co-Authors

Avatar

Steve Lu

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alon Rosen

Interdisciplinary Center Herzliya

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nadia Heninger

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Ted Chinburg

University of Pennsylvania

View shared research outputs
Researchain Logo
Decentralizing Knowledge