Peter Gazi
Institute of Science and Technology Austria
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Peter Gazi.
information theory workshop | 2015
Peter Gazi; Stefano Tessaro
Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker. This model gives rise to information-theoretic security analyses, and several advances have been made in this area over the last few years. This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view.
theory and application of cryptographic techniques | 2018
Bernardo David; Peter Gazi; Aggelos Kiayias; Alexander Russell
We present “Ouroboros Praos”, a proof-of-stake blockchain protocol that, for the first time, provides security against fully-adaptive corruption in the semi-synchronous setting: Specifically, the adversary can corrupt any participant of a dynamically evolving population of stakeholders at any moment as long the stakeholder distribution maintains an honest majority of stake; furthermore, the protocol tolerates an adversarially-controlled message delivery delay unknown to protocol participants.
international symposium on information theory | 2014
Grégory Demay; Peter Gazi; Ueli Maurer; Björn Tackmann
Most cryptographic security proofs require showing that two systems are indistinguishable. A central tool in such proofs is that of a game, where winning the game means provoking a certain condition, and it is shown that the two systems considered cannot be distinguished unless this condition is provoked. Upper bounding the probability of winning such a game, i.e., provoking this condition, for an arbitrary strategy is usually hard, except in the special case where the best strategy for winning such a game is known to be non-adaptive. A sufficient criterion for ensuring the optimality of non-adaptive strategies is that of conditional equivalence to a system, a notion introduced in [1]. In this paper, we show that this criterion is not necessary to ensure the optimality of non-adaptive strategies by giving two results of independent interest: 1) the optimality of non-adaptive strategies is not preserved under parallel composition; 2) in contrast, conditional equivalence is preserved under parallel composition.
IACR Cryptology ePrint Archive | 2016
Joël Alwen; Peter Gazi; Chethan Kamath; Karen Klein; Georg Osang; Krzysztof Pietrzak; Leonid Reyzin; Michal Rolinek; Michal Rybár
IACR Cryptology ePrint Archive | 2017
Bernardo David; Peter Gazi; Aggelos Kiayias; Alexander Russell
IACR Cryptology ePrint Archive | 2015
Peter Gazi; Krzysztof Pietrzak; Stefano Tessaro
IACR Cryptology ePrint Archive | 2015
Sunoo Park; Krzysztof Pietrzak; Albert Kwon; Joël Alwen; Georg Fuchsbauer; Peter Gazi
IACR Cryptology ePrint Archive | 2018
Peter Gazi; Aggelos Kiayias; Alexander Russell
IACR Cryptology ePrint Archive | 2012
Peter Gazi; Stefano Tessaro
IACR Cryptology ePrint Archive | 2009
Peter Gazi; Ueli Maurer