Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Peter Gazi is active.

Publication


Featured researches published by Peter Gazi.


information theory workshop | 2015

Secret-key cryptography from ideal primitives: A systematic overview

Peter Gazi; Stefano Tessaro

Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker. This model gives rise to information-theoretic security analyses, and several advances have been made in this area over the last few years. This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view.


theory and application of cryptographic techniques | 2018

Ouroboros Praos: An Adaptively-Secure, Semi-synchronous Proof-of-Stake Blockchain

Bernardo David; Peter Gazi; Aggelos Kiayias; Alexander Russell

We present “Ouroboros Praos”, a proof-of-stake blockchain protocol that, for the first time, provides security against fully-adaptive corruption in the semi-synchronous setting: Specifically, the adversary can corrupt any participant of a dynamically evolving population of stakeholders at any moment as long the stakeholder distribution maintains an honest majority of stake; furthermore, the protocol tolerates an adversarially-controlled message delivery delay unknown to protocol participants.


international symposium on information theory | 2014

Optimality of non-adaptive strategies: The case of parallel games

Grégory Demay; Peter Gazi; Ueli Maurer; Björn Tackmann

Most cryptographic security proofs require showing that two systems are indistinguishable. A central tool in such proofs is that of a game, where winning the game means provoking a certain condition, and it is shown that the two systems considered cannot be distinguished unless this condition is provoked. Upper bounding the probability of winning such a game, i.e., provoking this condition, for an arbitrary strategy is usually hard, except in the special case where the best strategy for winning such a game is known to be non-adaptive. A sufficient criterion for ensuring the optimality of non-adaptive strategies is that of conditional equivalence to a system, a notion introduced in [1]. In this paper, we show that this criterion is not necessary to ensure the optimality of non-adaptive strategies by giving two results of independent interest: 1) the optimality of non-adaptive strategies is not preserved under parallel composition; 2) in contrast, conditional equivalence is preserved under parallel composition.


IACR Cryptology ePrint Archive | 2016

On the Memory-Hardness of Data-Independent Password-Hashing Functions.

Joël Alwen; Peter Gazi; Chethan Kamath; Karen Klein; Georg Osang; Krzysztof Pietrzak; Leonid Reyzin; Michal Rolinek; Michal Rybár


IACR Cryptology ePrint Archive | 2017

Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol.

Bernardo David; Peter Gazi; Aggelos Kiayias; Alexander Russell


IACR Cryptology ePrint Archive | 2015

Tight Bounds for Keyed Sponges and Truncated CBC.

Peter Gazi; Krzysztof Pietrzak; Stefano Tessaro


IACR Cryptology ePrint Archive | 2015

Spacemint: A Cryptocurrency Based on Proofs of Space.

Sunoo Park; Krzysztof Pietrzak; Albert Kwon; Joël Alwen; Georg Fuchsbauer; Peter Gazi


IACR Cryptology ePrint Archive | 2018

Stake-Bleeding Attacks on Proof-of-Stake Blockchains.

Peter Gazi; Aggelos Kiayias; Alexander Russell


IACR Cryptology ePrint Archive | 2012

Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading.

Peter Gazi; Stefano Tessaro


IACR Cryptology ePrint Archive | 2009

Cascade Encryption Revisited.

Peter Gazi; Ueli Maurer

Collaboration


Dive into the Peter Gazi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Krzysztof Pietrzak

Institute of Science and Technology Austria

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Joël Alwen

Institute of Science and Technology Austria

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chethan Kamath

Institute of Science and Technology Austria

View shared research outputs
Top Co-Authors

Avatar

Georg Osang

Institute of Science and Technology Austria

View shared research outputs
Top Co-Authors

Avatar

Karen Klein

Institute of Science and Technology Austria

View shared research outputs
Researchain Logo
Decentralizing Knowledge