Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Salil P. Vadhan is active.

Publication


Featured researches published by Salil P. Vadhan.


theory of cryptography conference | 2009

Proofs of Retrievability via Hardness Amplification

Yevgeniy Dodis; Salil P. Vadhan; Daniel Wichs

Proofs of Retrievability (PoR) , introduced by Juels and Kaliski [JK07], allow the client to store a file F on an untrusted server, and later run an efficient audit protocol in which the server proves that it (still) possesses the clients data. Constructions of PoR schemes attempt to minimize the client and server storage, the communication complexity of an audit, and even the number of file-blocks accessed by the server during the audit. In this work, we identify several different variants of the problem (such as bounded-use vs. unbounded-use, knowledge-soundness vs. information-soundness), and giving nearly optimal PoR schemes for each of these variants. Our constructions either improve (and generalize) the prior PoR constructions, or give the first known PoR schemes with the required properties. In particular, we Formally prove the security of an (optimized) variant of the bounded-use scheme of Juels and Kaliski [JK07], without making any simplifying assumptions on the behavior of the adversary. Build the first unbounded-use PoR scheme where the communication complexity is linear in the security parameter and which does not rely on Random Oracles, resolving an open question of Shacham and Waters [SW08]. Build the first bounded-use scheme with information-theoretic security. The main insight of our work comes from a simple connection between PoR schemes and the notion of hardness amplification , extensively studied in complexity theory. In particular, our improvements come from first abstracting a purely information-theoretic notion of PoR codes , and then building nearly optimal PoR codes using state-of-the-art tools from coding and complexity theory.


Journal of the ACM | 2009

Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes

Venkatesan Guruswami; Christopher Umans; Salil P. Vadhan

We give an improved explicit construction of highly unbalanced bipartite expander graphs with expansion arbitrarily close to the degree (which is polylogarithmic in the number of vertices). Both the degree and the number of right-hand vertices are polynomially close to optimal, whereas the previous constructions of Ta-Shma et al. [2007] required at least one of these to be quasipolynomial in the optimal. Our expanders have a short and self-contained description and analysis, based on the ideas underlying the recent list-decodable error-correcting codes of Parvaresh and Vardy [2005]. Our expanders can be interpreted as near-optimal “randomness condensers,” that reduce the task of extracting randomness from sources of arbitrary min-entropy rate to extracting randomness from sources of min-entropy rate arbitrarily close to 1, which is a much easier task. Using this connection, we obtain a new, self-contained construction of randomness extractors that is optimal up to constant factors, while being much simpler than the previous construction of Lu et al. [2003] and improving upon it when the error parameter is small (e.g., 1/poly(n)).


symposium on the theory of computing | 1998

The power of a pebble: exploring and mapping directed graphs

Michael A. Bender; A. Fernandez; Dana Ron; Amit Sahai; Salil P. Vadhan

Exploring and mapping an unknown environment is a fundamental problem that is studied in a variety of contexts. Many results have focused on finding efficient solutions to restricted versions of the problem. In this paper, we consider a model that makes very limited assumptions about the environment and solve the mapping problem in this general setting. We model the environment by an unknown directed graph G, and consider the problem of a robot exploring and mapping G. The edges emanating from each vertex are numbered from ‘1’ to ‘d’, but we do not assume that the vertices of G are labeled. Since the robot has no way of distinguishing between vertices, it has no hope of succeeding unless it is given some means of distinguishing between vertices. For this reason we provide the robot with a “pebble”—a device that it can place on a vertex and use to identify the vertex later. In this paper we show: (1) If the robot knows an upper bound on the number of vertices then it can learn the graph efficiently with only one pebble. (2) If the robot does not know an upper bound on the number of vertices n, then (log log n) pebbles are both necessary and sufficient. In both cases our algorithms are deterministic. C


SIAM Journal on Computing | 2002

The Complexity of Counting in Sparse, Regular, and Planar Graphs

Salil P. Vadhan

We show that a number of graph-theoretic counting problems remain


theory of cryptography conference | 2004

Notions of Reducibility between Cryptographic Primitives

Omer Reingold; Luca Trevisan; Salil P. Vadhan

{\cal NP}


foundations of computer science | 1999

Verifiable random functions

Silvio Micali; Michael O. Rabin; Salil P. Vadhan

-hard, indeed


foundations of computer science | 2000

Extracting randomness from samplable distributions

Luca Trevisan; Salil P. Vadhan

\#{\cal P}


SIAM Journal on Computing | 2006

Robust PCPs of Proximity, Shorter PCPs, and Applications to Coding

Eli Ben-Sasson; Oded Goldreich; Prahladh Harsha; Madhu Sudan; Salil P. Vadhan

-complete, in very restricted classes of graphs. In particular, we prove that the problems of counting matchings, vertex covers, independent sets, and extremal variants of these all remain hard when restricted to planar bipartite graphs of bounded degree or regular graphs of constant degree. We obtain corollaries about counting cliques in restricted classes of graphs and counting satisfying assignments to restricted classes of monotone 2-CNF formulae. To achieve these results, a new interpolation-based reduction technique which preserves properties such as constant degree is introduced.


international cryptology conference | 2009

Computational Differential Privacy

Ilya Mironov; Omkant Pandey; Omer Reingold; Salil P. Vadhan

Starting with the seminal paper of Impagliazzo and Rudich [17], there has been a large body of work showing that various cryptographic primitives cannot be reduced to each other via “black-box” reductions. The common interpretation of these results is that there are inherent limitations in using a primitive as a black box, and that these impossibility results can be overcome only by explicitly using the code of the primitive in the construction.


international cryptology conference | 2003

Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More

Daniele Micciancio; Salil P. Vadhan

We efficiently combine unpredictability and verifiability by extending the Goldreich-Goldwasser-Micali (1986) construction of pseudorandom functions f/sub s/ from a secret seed s, so that knowledge of s not only enables one to evaluate f/sub s/ at any point x, but also to provide an NP-proof that the value f/sub s/(x) is indeed correct without compromising the unpredictability of f/sub s/ at any other point for which no such a proof was provided.

Collaboration


Dive into the Salil P. Vadhan's collaboration.

Researchain Logo
Decentralizing Knowledge