Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Danny Dolev is active.

Publication


Featured researches published by Danny Dolev.


symposium on the theory of computing | 1991

Non-malleable cryptography

Danny Dolev; Cynthia Dwork; Moni Naor

The notion of non-malleable cryptography, an extension of semantically secure cryptography, is defined. Informally, the additional requirement is that given the ciphertext it is impossible to generate a different ciphertext so that the respective plaintexts are related. The same concept makes sense in the contexts of string commitment and zero-knowledge proofs of possession of knowledge. Non-malleable schemes for each of these three problems are presented. The schemes do not assume a trusted center; a user need not know anything about the number or identity of other system users.


SIAM Journal on Computing | 2000

Nonmalleable Cryptography

Danny Dolev; Cynthia Dwork; Moni Naor

The notion of nonmalleable cryptography, an extension of semantically secure cryptography, is defined. Informally, in the context of encryption the additional requirement is that given the ciphertext it is impossible to generate a different ciphertext so that the respective plaintexts are related. The same concept makes sense in the contexts of string commitment and zero-knowledge proofs of possession of knowledge. Nonmalleable schemes for each of these three problems are presented. The schemes do not assume a trusted center; a user need not know anything about the number or identity of other system users. Our cryptosystem is the first proven to be secure against a strong type of chosen ciphertext attack proposed by Rackoff and Simon, in which the attacker knows the ciphertext she wishes to break and can query the decryption oracle on any ciphertext other than the target.


Journal of the ACM | 1986

Reaching approximate agreement in the presence of faults

Danny Dolev; Nancy A. Lynch; Shlomit S. Pinter; Eugene W. Stark; William E. Weihl

This paper considers a variant of the Byzantine Generals problem, in which processes start with arbitrary real values rather than Boolean values or values from some bounded range, and in which approximate, rather than exact, agreement is the desired goal. Algorithms are presented to reach approximate agreement in asynchronous, as well as synchronous systems. The asynchronous agreement algorithm is an interesting contrast to a result of Fischer et al, who show that exact agreement with guaranteed termination is not attainable in an asynchronous system with as few as one faulty process. The algorithms work by successive approximation, with a provable convergence rate that depends on the ratio between the number of faulty processes and the total number of processes. Lower bounds on the convergence rate for algorithms of this form are proved, and the algorithms presented are shown to be optimal.


SIAM Journal on Computing | 1983

Authenticated Algorithms for Byzantine Agreement

Danny Dolev; H. R. Strong

Reaching agreement in a distributed system in the presence of faulty processors is a central issue for reliable computer systems. Using an authentication protocol, one can limit the undetected behavior of faulty processors to a simple failure to relay messages to all intended targets. In this paper we show that, in spite of such an ability to limit faulty behavior, and no matter what message types or protocols are allowed, reaching (Byzantine) agreement requires at least


Communications of The ACM | 1996

The Transis approach to high availability cluster communication

Danny Dolev; Dalia Malki

t + 1


Journal of the ACM | 1990

Renaming in an asynchronous environment

Hagit Attiya; Amotz Bar-Noy; Danny Dolev; David Peleg; Rüdiger Reischuk

phases or rounds of information exchange, where t is an upper bound on the number of faulty processors. We present algorithms for reaching agreement based on authentication that require a total number of messages sent by correctly operating processors that is polynomial in both t and the number of processors, n. The best algorithm uses only


foundations of computer science | 1981

On the security of public key protocols

Danny Dolev; Andrew Chi-Chih Yao

t + 1


Journal of the ACM | 1990

Early stopping in Byzantine agreement

Danny Dolev; Ruediger Reischuk; H. Raymond Strong

phases and


ieee international symposium on fault tolerant computing | 1992

Transis: a communication subsystem for high availability

Yair Amir; Danny Dolev; Shlomo Kramer; Dalia Malki

O(nt)


principles of distributed computing | 1984

Fault-tolerant clock synchronization

Joseph Y. Halpern; Barbara Simons; H. Raymond Strong; Danny Dolev

messages.

Collaboration


Dive into the Danny Dolev's collaboration.

Top Co-Authors

Avatar

Tal Anker

Hebrew University of Jerusalem

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Danny Bickson

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Dalia Malki

Hebrew University of Jerusalem

View shared research outputs
Top Co-Authors

Avatar

Idit Keidar

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ezra N. Hoch

Hebrew University of Jerusalem

View shared research outputs
Top Co-Authors

Avatar

Amotz Bar-Noy

City University of New York

View shared research outputs
Researchain Logo
Decentralizing Knowledge