Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rafael Dowsley is active.

Publication


Featured researches published by Rafael Dowsley.


cloud computing security workshop | 2011

Do you know where your cloud files are

Karyn Benson; Rafael Dowsley; Hovav Shacham

Clients of storage-as-a-service systems such as Amazons S3 want to be sure that the files they have entrusted to the cloud are available now and will be available in the future. Using protocols from previous work on proofs of retriev-ability and on provable data possession, clients can verify that their files are available now. But these protocols do not guarantee that the files are replicated onto multiple drives or multiple datacenters. Such tests are crucial if cloud storage is to provide resilience to natural disasters and power outages as well as improving the network latency to different parts of the world. In this paper, we study the problem of verifying that a cloud storage provider replicates the data in diverse geolocations. We provide a theoretical framework for verifying this property. Our model accurately determines which Amazon CloudFront location serves content for Planetlab nodes across the continental US. Our work is complementary to the recent paper of Bowers et al., which uses different techniques to verify that files are replicated across multiple drives in a single datacenter.


theory and application of cryptographic techniques | 2012

Standard security does not imply security against selective-opening

Mihir Bellare; Rafael Dowsley; Brent Waters; Scott Yilek

We show that no commitment scheme that is hiding and binding according to the standard definition is semantically-secure under selective opening attack (SOA), resolving a long-standing and fundamental open question about the power of SOAs. We also obtain the first examples of IND-CPA encryption schemes that are not secure under SOA, both for sender corruptions where encryption coins are revealed and receiver corruptions where decryption keys are revealed. These results assume only the existence of collision-resistant hash functions.


the cryptographers track at the rsa conference | 2009

A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model

Rafael Dowsley; Jörn Müller-Quade; Anderson C. A. Nascimento

We show that a recently proposed construction by Rosen and Segev can be used for obtaining the first public key encryption scheme based on the McEliece assumptions which is secure against adaptive chosen ciphertext attacks in the standard model.


international conference on information theoretic security | 2008

Oblivious Transfer Based on the McEliece Assumptions

Rafael Dowsley; Jeroen van de Graaf; Jörn Müller-Quade; Anderson C. A. Nascimento

We implement one-out-of-two bit oblivious transfer (OT) based on the assumptions used in the McEliece cryptosystem: the hardness of decoding random binary linear codes, and the difficulty of distinguishing a permuted generating matrix of Goppa codes from a random matrix. To our knowledge this is the first OT reduction to these problems only.


IEEE Transactions on Information Theory | 2012

A CCA2 Secure Variant of the McEliece Cryptosystem

Nico Döttling; Rafael Dowsley; Jörn Müller-Quade; Anderson C. A. Nascimento

The McEliece public-key encryption scheme has become an interesting alternative to cryptosystems based on number-theoretical problems. Different from RSA and ElGamal, McEliece PKC is not known to be broken by a quantum computer. Moreover, even though McEliece PKC has a relatively big key size, encryption and decryption operations are rather efficient. In spite of all the recent results in coding-theory-based cryptosystems, to the date, there are no constructions secure against chosen ciphertext attacks in the standard model-the de facto security notion for public-key cryptosystems. In this paper, we show the first construction of a McEliece-based public-key cryptosystem secure against chosen ciphertext attacks in the standard model. Our construction is inspired by a recently proposed technique by Rosen and Segev.


cryptology and network security | 2014

Universally Composable Oblivious Transfer Based on a Variant of LPN

Bernardo David; Rafael Dowsley; Anderson C. A. Nascimento

Oblivious transfer OT is a fundamental two-party cryptographic primitive that implies secure multiparty computation. In this paper, we introduce the first OT based on the Learning Parity with Noise LPN problem. More specifically, we use the LPN variant that was introduced by Alekhnovich FOCS 2003. We prove that our protocol is secure against active static adversaries in the Universal Composability framework in the common reference string model. Our constructions are based solely on a LPN style assumption and thus represents a clear next step from current code-based OT protocols, which require an additional assumption related to the indistinguishability of public keys from random matrices. Our constructions are inspired by the techniques used to obtain OT based on the McEliece cryptosystem.


ieee acm international conference utility and cloud computing | 2015

Towards trusted ehealth services in the cloud

Antonis Michalas; Rafael Dowsley

As adoption of eHealth solutions advances, new computing paradigms - such as cloud computing - bring the potential to improve efficiency in managing medical health records and help reduce costs. However, these opportunities introduce new security risks which can not be ignored. In this paper, we present a forward-looking design for a privacy-preserving eHealth cloud system. The proposed solution, is based on a Symmetric Searchable Encryption scheme that allows patients of an electronic healthcare system to securely store encrypted versions of their medical data and search directly on them without having to decrypt them first. As a result, the proposed protocol offers better protection than the current available solutions and paves the way for the next generation of eHealth systems.


Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security | 2015

Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data

Martine De Cock; Rafael Dowsley; Anderson C. A. Nascimento; Stacey Newman

This work proposes a protocol for performing linear regression over a dataset that is distributed over multiple parties. The parties will jointly compute a linear regression model without actually sharing their own private datasets. We provide security definitions, a protocol, and security proofs. Our solution is information-theoretically secure and is based on the assumption that a Trusted Initializer pre-distributes random, correlated data to the parties during a setup phase. The actual computation happens later on, during an online phase, and does not involve the trusted initializer. Our online protocol is orders of magnitude faster than previous solutions. In the case where a trusted initializer is not available, we propose a computationally secure two-party protocol based on additive homomorphic encryption that substitutes the trusted initializer. In this case, the online phase remains the same and the offline phase is computationally heavy. However, because the computations in the offline phase happen over random data, the overall problem is embarrassingly parallelizable, making it faster than existing solutions for processors with an appropriate number of cores.


International Journal of Information Security | 2015

Information-theoretically secure oblivious polynomial evaluation in the commodity-based model

Rafael Tonicelli; Anderson C. A. Nascimento; Rafael Dowsley; Jörn Müller-Quade; Hideki Imai; Goichiro Hanaoka; Akira Otsuka

Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polynomial


workshop on information security applications | 2010

A two-party protocol with trusted initializer for computing the inner product

Rafael Dowsley; Jeroen van de Graaf; Davidson Marques; Anderson C. A. Nascimento

Collaboration


Dive into the Rafael Dowsley's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jörn Müller-Quade

Karlsruhe Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Goichiro Hanaoka

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeroen van de Graaf

Universidade Federal de Minas Gerais

View shared research outputs
Top Co-Authors

Avatar

Akira Otsuka

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Mario Larangeira

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge