Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Danny Harnik is active.

Publication


Featured researches published by Danny Harnik.


foundations of computer science | 2006

On the Compressibility of NP Instances and Cryptographic Applications

Danny Harnik; Moni Naor

We initiate the study of compression that preserves the solution to an instance of a problem rather than preserving the instance itself. Our focus is on the compressibility of NP decision problems. We consider NP problems that have long instances but relatively short witnesses. The question is, can one efficiently compress an instance and store a shorter representation that maintains the information of whether the original input is in the language or not. We want the length of the compressed instance to be polynomial in the length of the witness rather than the length of original input. Such compression enables to succinctly store instances until a future setting will allow solving them, either via a technological or algorithmic breakthrough or simply until enough time has elapsed. We give a new classification of NP with respect to compression. This classification forms a stratification of NP that we call the VC hierarchy. The hierarchy is based on a new type of reduction called W-reduction and there are compression-complete problems for each class. Our motivation for studying this issue stems from the vast cryptographic implications compressibility has. For example, we say that SAT is compressible if there exists a polynomial p(middot, middot) so that given a formula consisting of m clauses over n variables it is possible to come up with an equivalent (w.r.t satisfiability) formula of size at most p(n, log m). Then given a compression algorithm for SAT we provide a construction of collision resistant hash functions from any one-way function. This task was shown to be impossible via black-box reductions (D. Simon, 1998), and indeed the construction presented is inherently non-black-box. Another application of SAT compressibility is a cryptanalytic result concerning the limitation of everlasting security in the bounded storage model when mixed with (time) complexity based cryptography. In addition, we study an approach to constructing an oblivious transfer protocol from any one-way function. This approach is based on compression for SAT that also has a property that we call witness retrievability. However, we mange to prove severe limitations on the ability to achieve witness retrievable compression of SAT


theory of cryptography conference | 2004

Constant-Round Oblivious Transfer in the Bounded Storage Model

Yan Zong Ding; Danny Harnik; Alon Rosen; Ronen Shaltiel

We present a constant round protocol for Oblivious Transfer in Maurers bounded storage model. In this model, a long random string R is initially transmitted and each of the parties interacts based on a small portion of R. Even though the portions stored by the honest parties are small, security is guaranteed against any malicious party that remembers almost all of the string R. Previous constructions for Oblivious Transfer in the bounded storage model required polynomially many rounds of interaction. Our protocol has only 5 messages. We also improve other parameters, such as the number of bits transferred and the probability of immaturely aborting the protocol due to failure. Our techniques utilize explicit constructions from the theory of derandomization. In particular, we use constructions of almost t-wise independent permutations, randomness extractors and averaging samplers.


SIAM Journal on Computing | 2010

On the Compressibility of

Danny Harnik; Moni Naor

We study compression that preserves the solution to an instance of a problem rather than preserving the instance itself. Our focus is on the compressibility of


international cryptology conference | 2006

\mathcal{NP}

Iftach Haitner; Danny Harnik; Omer Reingold

mathcal{NP}


symposium on the theory of computing | 2000

Instances and Cryptographic Applications

Danny Harnik; Ran Raz

decision problems. We consider


international colloquium on automata languages and programming | 2006

On the power of the randomized iterate

Danny Harnik; Moni Naor

mathcal{NP}


symposium on the theory of computing | 2004

Higher lower bounds on monotone size

Danny Harnik; Moni Naor; Omer Reingold; Alon Rosen

problems that have long instances but relatively short witnesses. The question is whether one can efficiently compress an instance and store a shorter representation that maintains the information of whether the original input is in the language or not. We want the length of the compressed instance to be polynomial in the length of the witness and polylog in the length of original input. Such compression enables succinctly storing instances until a future setting will allow solving them, either via a technological or algorithmic breakthrough or simply until enough time has elapsed. In this paper, we first develop the basic complexity theory of compression, including reducibility, completeness, and a stratification of


international colloquium on automata languages and programming | 2006

On everlasting security in the hybrid bounded storage model

Iftach Haitner; Danny Harnik; Omer Reingold

mathcal{NP}


international cryptology conference | 2007

Completeness in two-party secure computation: a computational view

Danny Harnik; Yuval Ishai; Eyal Kushilevitz

with respect to compression. We then show that compressibility (say, of SAT) would have vast implications for cryptography, including constructions of one-way functions and collision resistant hash functions from any hard-on-average problem in


Journal of Cryptology | 2006

Efficient pseudorandom generators from exponentially hard one-way functions

Danny Harnik; Moni Naor; Omer Reingold; Alon Rosen

mathcal{NP}

Collaboration


Dive into the Danny Harnik's collaboration.

Top Co-Authors

Avatar

Moni Naor

Weizmann Institute of Science

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alon Rosen

Interdisciplinary Center Herzliya

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yuval Ishai

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eyal Kushilevitz

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ran Raz

Weizmann Institute of Science

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge