Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ryan Moriarty is active.

Publication


Featured researches published by Ryan Moriarty.


SIAM Journal on Computing | 2014

Position-Based Cryptography

Nishanth Chandran; Vipul Goyal; Ryan Moriarty; Rafail Ostrovsky

In this paper, we initiate the theoretical study of cryptographic protocols where the identity, or other credentials and inputs, of a party are derived from its geographic location. We start by considering the central task in this setting, i.e., securely verifying the position of a device. Despite much work in this area, we show that in the vanilla (or standard) model, the above task (i.e., of secure positioning) is impossible to achieve, even if we assume that the adversary is computationally bounded. In light of the above impossibility result, we then turn to Dziembowskis bounded retrieval model (a variant of Maurers bounded storage model) and formalize and construct information theoretically secure protocols for two fundamental tasks: secure positioning and position-based key exchange. We then show that these tasks are in fact universal in this setting---we show how we can use them to realize secure multiparty computation. Our main contribution in this paper is threefold: to place the problem of secu...


theory of cryptography conference | 2006

Generalized environmental security from number theoretic assumptions

Tal Malkin; Ryan Moriarty; Nikolai Yakovenko

We address the problem of realizing concurrently composable secure computation without setup assumptions. While provably impossible in the UC framework of [Can01], Prabhakaran and Sahai had recently suggested a relaxed framework called generalized Environmental Security (gES) [PS04], as well as a restriction of it to a “client-server” setting based on monitored functionalities [PS05]. In these settings, the impossibility results do not apply, and they provide secure protocols relying on new non-standard assumptions regarding the existence of hash functions with certain properties. In this paper, we first provide gES protocols for general secure computation, based on a new, concrete number theoretic assumption called the relativized discrete log assumption (rDLA). Second, we provide secure protocols for functionalities in the (limited) client-server framework of [PS05], replacing their hash function assumption with the standard discrete log assumption. Both our results (like previous work) also use (standard) super-polynomially strong trapdoor permutations. We believe this is an important step towards obtaining positive results for efficient secure computation in a concurrent environment based on well studied assumptions. Furthermore, the new assumption we put forward is of independent interest, and may prove useful for other cryptographic applications.


ieee computer security foundations symposium | 2008

A Correctness Proof of a Mesh Security Architecture

Doug Kuhlman; Ryan Moriarty; Tony Braskich; Steve Emeott; Mahesh V. Tripunitara

The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a developed key hierarchy and full protocol definitions. This paper examines the correctness and security of the MSA proposal and its corresponding protocols. We utilize Protocol Composition Logic (PCL) to prove individual protocols secure, as well as their composition. We add to the structure of PCL, generalizing it for peer-to-peer applications. We also discuss two security issues we discovered with original versions of the proposals and our proposed remedies.


ACM Transactions on Algorithms | 2008

Improved algorithms for optimal embeddings

Nishanth Chandran; Ryan Moriarty; Rafail Ostrovsky; Omkant Pandey; Mohammad Ali Safari; Amit Sahai

In the last decade, the notion of metric embeddings with small distortion has received wide attention in the literature, with applications in combinatorial optimization, discrete mathematics, and bio-informatics. The notion of embedding is, given two metric spaces on the same number of points, to find a bijection that minimizes maximum Lipschitz and bi-Lipschitz constants. One reason for the popularity of the notion is that algorithms designed for one metric space can be applied to a different one, given an embedding with small distortion. The better distortion, the better the effectiveness of the original algorithm applied to a new metric space. The goal recently studied by Kenyon et al. [2004] is to consider all possible embeddings between two finite metric spaces and to find the best possible one; that is, consider a single objective function over the space of all possible embeddings that minimizes the distortion. In this article we continue this important direction. In particular, using a theorem of Albert and Atkinson [2005], we are able to provide an algorithm to find the optimal bijection between two line metrics, provided that the optimal distortion is smaller than 13.602. This improves the previous bound of 3 + 2&sqrt;2, solving an open question posed by Kenyon et al. [2004]. Further, we show an inherent limitation of algorithms using the “forbidden pattern” based dynamic programming approach, in that they cannot find optimal mapping if the optimal distortion is more than 7 + 4&sqrt;3 (≃ 13.928). Thus, our results are almost optimal for this method. We also show that previous techniques for general embeddings apply to a (slightly) more general class of metrics.


Archive | 2009

Oblivious Image Matching

Shai Avidan; Ariel Elbaz; Tal Malkin; Ryan Moriarty

Video surveillance is an intrusive operation that violates privacy. It is therefore desirable to devise surveillance protocols that minimize or even eliminate privacy intrusion. A principled way of doing so is to resort to Secure Multi-Party methods, that are provably secure, and adapt them to various vision algorithms. In this chapter, we describe an Oblivious Image Matching protocol which is a secure protocol for image matching. Image matching is a generalization of detection and recognition tasks since detection can be viewed as matching a particular image to a given object class (i.e., does this image contain a face?) while recognition can be viewed as matching an image of a particular instance of a class to another image of the same instance (i.e., does this image contain a particular car?). And instead of applying the Oblivious Image Matching to the entire image one can apply it to various sub-images, thus solving the localization problem (i.e., where is the gun in the image?). A leading approach to object detection and recognition is the bag-offeatures approach, where each object is reduced to a set of features and matching objects is reduced to matching their corresponding sets of features. Oblivious Image Matching uses a secure fuzzy match of string and sets as its building block. In the proposed protocol, two parties, Alice and Bob, wish to match their images, without leaking additional information. We use a novel cryptographic protocol for fuzzy matching and adopt it to the bag-of-features approach. Fuzzy matching compares two sets (or strings) and declares them to match if a certain percentage of their elements match. To apply fuzzy matching to images, we represent images as a set of visual words that can be fed to the secure fuzzy matching protocol. The fusion of a novel cryptographic protocol and recent advances in computer vision results in a secure and efficient protocol for image matching. Experiments on real images are presented.


international cryptology conference | 2009

Position Based Cryptography

Nishanth Chandran; Vipul Goyal; Ryan Moriarty; Rafail Ostrovsky


IACR Cryptology ePrint Archive | 2007

A Proof of Security of a Mesh Security Architecture.

Doug Kuhlman; Ryan Moriarty; Tony Braskich; Steve Emeott; Mahesh V. Tripunitara


international conference on the theory and application of cryptology and information security | 2007

Concurrent statistical zero-knowledge arguments for NP from one way functions

Vipul Goyal; Ryan Moriarty; Rafail Ostrovsky; Amit Sahai


IACR Cryptology ePrint Archive | 2009

Position Based Cryptography.

Nishanth Chandran; Vipul Goyal; Ryan Moriarty; Rafail Ostrovsky


Electronic Colloquium on Computational Complexity | 2006

Improved Algorithms for Optimal Embeddings.

Nishanth Chandran; Ryan Moriarty; Rafail Ostrovsky; Omkant Pandey; Amit Sahai

Collaboration


Dive into the Ryan Moriarty's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amit Sahai

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge