CV March 2021 2012 – 2013 Course Lecturer, the Hebrew University of Jerusalem

Total Page:16

File Type:pdf, Size:1020Kb

CV March 2021 2012 – 2013 Course Lecturer, the Hebrew University of Jerusalem Yannai A. Gonczarowski – Scientific Curriculum Vitæ (March 2021) Personal Details Email: [email protected] Web: http://yannai.gonch.name/ Married + 2 Academic Education 2012 – 2018 Doctorate (Ph.D.) in Mathematics and Computer Science with a Specialization in the Center for the Study of Rationality, The Hebrew University of Jerusalem. Advisors: Prof. Sergiu Hart and Prof. Noam Nisan. Dissertation: Aspects of Complexity and Simplicity in Economic Mechanisms. 2008 – 2012 Master's degree (M.Sc.) in Mathematics, Summa cum laude from the Hebrew University of Jerusalem. Research thesis: Timely Coordination in a Multi-Agent System; advisors: Prof. Gil Kalai (HUJI) and Prof. Yoram Moses (Technion). GPA: 98.97. Ranked second in my class of 180 students in the Faculty of Mathematics and Natural Sciences; ranked first among Mathematics students. 2008 – 2010 Master's degree (M.Mus.) from the Jerusalem Academy of Music and Dance, majoring in Classical Singing. 2004 – 2008 Bachelor's degree (B.Sc.), Summa cum laude from the Hebrew University of Jerusalem in Mathematics (full program) and Computer Sciences (full program), in the Faculty of Mathematics and Natural Sciences "Amirim Special Honors Program." Research thesis: Sisterhood in the Gale-Shapley Matching Algorithm; advisor: Prof. Ehud Friedgut. GPA: 99.19. Ranked first in my class of 473 students in the Faculty of Mathematics and Natural Sciences. 2004 – 2008 Bachelor's degree (B.Mus.) from the Jerusalem Academy of Music and Dance, majoring in Classical Singing. Professional Experience 2019 – Postdoctoral Researcher, Microsoft Research New England. present 2019 Postdoctoral Fellow, Tel Aviv University. Six-month postdoctoral fellowship, waiting for my wife to graduate. Hosted by Prof. Michal Feldman and Prof. Amos Fiat. 2017 – 2019 Course Lecturer, The Hebrew University of Jerusalem. While a Ph.D. student: Lecturer (biweekly lecture, alternating with Prof. Noam Nisan) of the novel course "Introduction to Mathematical Logic for Programming-Oriented Students," which we created to teach Mathematical Logic through a series of programming exercises. Taking this course was officially recognized as fulfilment of the mandatory logic studies (Mathematical Logic 101) of undergraduate CS students. 2013 – 2019 Researcher (Intern), Microsoft Research, Herzliya, Israel. Ph.D. student internship. Game-theoretic research. Page 1 of 10 Yannai A. Gonczarowski – Scientific CV March 2021 2012 – 2013 Course Lecturer, The Hebrew University of Jerusalem. While a first-year Ph.D. student: Lecturer (two lectures each week) of the advanced group in the course "Introduction to Computer Science" (Computer Science 101)—a mandatory B.Sc. course for CS&E students. 2007 – 2013 Software Engineer Intern and then Software Engineer, Google Israel. Working part-time. Worked on Google Trends, Google Charts, Google Analytics, and Search Quality. 2005 – 2012 Freelance Professional Opera Singer In numerous productions. Notable parts include the title role in the world premiere of Oedipus Rex 2011 (Aharoni/Eliraz) in the Israel Festival in Jerusalem, and a lead role in a cabaret show based upon music composed in the Theresienstadt Ghetto during the holocaust (a performance with which I also toured in Philadelphia in late 2012). Performing in significantly lower capacity since 2013. Recent engagements include the baritone solo in Brahms' A German Requiem with the Tel Aviv Soloists Ensemble, the baritone solo in Faure's Requiem with the Israeli Chamber Orchestra, Papageno in Mozart's The Magic Flute at the Ralli Museum Festival in Caesarea, playing a music student in, and singing in the soundtrack of, the feature film Past Life, and most recently, the lead role (the Wise Doctor) in the world premiere of An Insane Hindik (Batt/Kolatt) directed by Israel's foremost stage director Yossi Yzraely. 2005 – 2011 Teaching Assistant, The Hebrew University of Jerusalem and IDC Herzliya. 2008-2011 (HUJI, starting while a first-year M.Sc. student): weekly TA lectures in "Infinitesimal Calculus I" and "Infinitesimal Calculus II"—mandatory B.Sc. courses for Math & CS students. 2008 (IDC): weekly TA lectures in "Computer Graphics," a mandatory B.Sc. CS course. 2006-2008 (HUJI, while a B.Sc. student): weekly TA lectures in "Representation and Management of Data on the Internet"—a B.Sc. and M.Sc. CS&E course. 2005-2007 (HUJI, starting while a second-year B.Sc. student): setting course guidelines and answering student questions in "From NAND to Tetris"—a B.Sc. and M.Sc. CS&E course based on the book "The Elements of Computing Systems." Also provided support to faculty teaching courses based on this book worldwide, as well as to self-learners. Co- architect of the software accompanying the book and the course. Academic Honors and Awards (Partial List) 2020 First Place, the inaugural INFORMS AMD Michael H. Rothkopf Junior Researcher Paper Prize, awarded annually to recognize "the best paper by a junior researcher in the area of Auctions and Market Design, with a particular focus on the use of Operations Research and/or Management Science techniques in the design or analysis of markets. The paper should provide an innovative approach to a realistic market-design problem, and should have potential impact for real-world market design." For "Matching for the Israeli "Mechinot" Gap Year: Handling Rich Diversity Requirements." (Award talk.) 2020 Best Flash Video Award at the 21st ACM Conference on Economics and Computation (EC), for "Escaping Cannibalization? Correlation-Robust Pricing for a Unit-Demand Buyer." 2020 Honorable Mention for Best Presentation by a Student or Postdoctoral Researcher at the 21th ACM Conference on Economics and Computation (EC), for "To Infinity and Beyond: Scaling Economic Theories via Logical Compactness." Page 2 of 10 Yannai A. Gonczarowski – Scientific CV March 2021 2019 ACM SIGecom Doctoral Dissertation Award, conferred annually by ACM SIGecom to recognize "an outstanding dissertation in the field of economics and computation." (Award talk.) 2019 Valedictorian of the Hebrew University Ph.D. convocation. 2019 Hans Wiener Prize for an outstanding doctoral degree recipient for 2019 from the Hebrew University of Jerusalem. 2019 Best Paper Award at MATCH-UP 2019, the 5th International Workshop on Matching Under Preferences, for "Matching for the Israeli "Mechinot" Gap Year: Handling Rich Diversity Requirements." 2019 Rothschild Fellowship (selected and declined). The most prestigious postdoctoral fellowship in Israel, awarded annually to twelve fellows across the Natural, Exact, or Life Sciences and Engineering. 2018 The inaugural ACM SIGecom Award for the Best Presentation by a Student or Postdoctoral Researcher at the 19th ACM Conference on Economics and Computation (EC), for "Are Two (Samples) Really Better Than One? On the Non-Asymptotic Performance of Empirical Revenue Maximization." 2018 The Michael B. Maschler Prize, awarded annually by the Israeli Chapter of the Game Theory Society "to an outstanding Ph.D. student in game theory and related topics" for their Ph.D. thesis. 2017 Second place, Adams Fellowship Conference Poster Competition held by the Israeli Academy of Sciences and Humanities. 2014 – 2018 Adams Fellowship, awarded by the Israeli Academy of Sciences and Humanities. The most prestigious Ph.D. fellowship in Israel, awarded annually to eight fellows across all scientific disciplines. Covered in the Jerusalem Post, July 7, 2014. 2010 The (Master's Degree) Rector's Prize for the academic year 2008-2009. 2009 – 2010 Luxembourg Scholarship for an Excelling Master's Student for 2008-2009 and 2009-2010. 2009 Klein Award for an Excelling Master's Student of Mathematics for 2008-2009. 2009 The Google Intern Scholarship (awarded to only five recipients across Europe). 2008 Class Valedictorian of the Faculty of Mathematics and Natural Sciences. 2008 Excellence scholarship for Classical Singing studies ("Keren Sharet") from the America- Israel Cultural Foundation for the academic years 2008-2009 and 2009-2010. 2005 – 2007 The (Bachelor's Degree) Rector's Prize for 2005-2006, the Dean's Prize of the Faculty of Mathematics and Natural Sciences for 2004-2005, and appeared on the Dean's List throughout all academic years as an undergraduate: 2004-2005, 2005-2006, 2006-2007. 2006 The "Intel-Dean Award" for the academic year 2005-2006. 1997 Fifth place, Israel National Physics Olympiad for High-School Students (while in 11th grade). Teaching Honors and Awards 2019 On the Outstanding Teacher list of the School of Computer Science and Engineering for the academic year 2018-2019 (served as lecturer in Introduction to Mathematical Logic for Programming-Oriented Students). Page 3 of 10 Yannai A. Gonczarowski – Scientific CV March 2021 2013 On the Outstanding Teacher list of the Faculty of Mathematics and Natural Sciences for the academic year 2012-2013 (served as lecturer in Introduction to Computer Science). Ranked first among all lecturers and TAs in the CS department on that academic year. 2011 On the Outstanding Teacher list of the Faculty of Mathematics and Natural Sciences for the academic year 2010-2011 (TA'd Infinitesimal Calculus). 2010 On the Outstanding Teacher list of the Faculty of Mathematics and Natural Sciences for the academic year 2009-2010 (TA'd Infinitesimal Calculus). Professional Service (Virtual) Local Chair, The 21st ACM Conference on Economics and Computation (EC), July 2020. Information Director, ACM Special Interest Group on Economics and Computation (ACM SIGecom) and ACM SIGecom Exchanges. Guest
Recommended publications
  • ACM Honors Eminent Researchers for Technical Innovations That Have Improved How We Live and Work 2016 Recipients Made Contribu
    Contact: Jim Ormond 212-626-0505 [email protected] ACM Honors Eminent Researchers for Technical Innovations That Have Improved How We Live and Work 2016 Recipients Made Contributions in Areas Including Big Data Analysis, Computer Vision, and Encryption NEW YORK, NY, May 3, 2017 – ACM, the Association for Computing Machinery (www.acm.org), today announced the recipients of four prestigious technical awards. These leaders were selected by their peers for making significant contributions that have had far-reaching impact on how we live and work. The awards reflect achievements in file sharing, broadcast encryption, information visualization and computer vision. The 2016 recipients will be formally honored at the ACM Awards Banquet on June 24 in San Francisco. The 2016 Award Recipients include: • Mahadev Satyanarayanan, Michael L. Kazar, Robert N. Sidebotham, David A. Nichols, Michael J. West, John H. Howard, Alfred Z. Spector and Sherri M. Nichols, recipients of the ACM Software System Award for developing the Andrew File System (AFS). AFS was the first distributed file system designed for tens of thousands of machines, and pioneered the use of scalable, secure and ubiquitous access to shared file data. To achieve the goal of providing a common shared file system used by large networks of people, AFS introduced novel approaches to caching, security, management and administration. AFS is still in use today as both an open source system and as the file system in commercial applications. It has also inspired several cloud-based storage applications. The 2016 Software System Award recipients designed and built the Andrew File System in the 1980s while working as a team at the Information Technology Center (ITC), a partnership between Carnegie Mellon University and IBM.
    [Show full text]
  • Compact E-Cash and Simulatable Vrfs Revisited
    Compact E-Cash and Simulatable VRFs Revisited Mira Belenkiy1, Melissa Chase2, Markulf Kohlweiss3, and Anna Lysyanskaya4 1 Microsoft, [email protected] 2 Microsoft Research, [email protected] 3 KU Leuven, ESAT-COSIC / IBBT, [email protected] 4 Brown University, [email protected] Abstract. Efficient non-interactive zero-knowledge proofs are a powerful tool for solving many cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing product equations (Eurocrypt 2008) to two related cryptographic problems: compact e-cash (Eurocrypt 2005) and simulatable verifiable random functions (CRYPTO 2007). We present the first efficient compact e-cash scheme that does not rely on a ran- dom oracle. To this end we construct efficient GS proofs for signature possession, pseudo randomness and set membership. The GS proofs for pseudorandom functions give rise to a much cleaner and substantially faster construction of simulatable verifiable random functions (sVRF) under a weaker number theoretic assumption. We obtain the first efficient fully simulatable sVRF with a polynomial sized output domain (in the security parameter). 1 Introduction Since their invention [BFM88] non-interactive zero-knowledge proofs played an important role in ob- taining feasibility results for many interesting cryptographic primitives [BG90,GO92,Sah99], such as the first chosen ciphertext secure public key encryption scheme [BFM88,RS92,DDN91]. The inefficiency of these constructions often motivated independent practical instantiations that were arguably conceptually less elegant, but much more efficient ([CS98] for chosen ciphertext security). We revisit two important cryptographic results of pairing-based cryptography, compact e-cash [CHL05] and simulatable verifiable random functions [CL07], that have very elegant constructions based on non-interactive zero-knowledge proof systems, but less elegant practical instantiations.
    [Show full text]
  • Data Structures Meet Cryptography: 3SUM with Preprocessing
    Data Structures Meet Cryptography: 3SUM with Preprocessing Alexander Golovnev Siyao Guo Thibaut Horel Harvard NYU Shanghai MIT [email protected] [email protected] [email protected] Sunoo Park Vinod Vaikuntanathan MIT & Harvard MIT [email protected] [email protected] Abstract This paper shows several connections between data structure problems and cryptography against preprocessing attacks. Our results span data structure upper bounds, cryptographic applications, and data structure lower bounds, as summarized next. First, we apply Fiat–Naor inversion, a technique with cryptographic origins, to obtain a data structure upper bound. In particular, our technique yields a suite of algorithms with space S and (online) time T for a preprocessing version of the N-input 3SUM problem where S3 T = O(N 6). This disproves a strong conjecture (Goldstein et al., WADS 2017) that there is no data· structure − − that solves this problem for S = N 2 δ and T = N 1 δ for any constant δ > 0. e Secondly, we show equivalence between lower bounds for a broad class of (static) data struc- ture problems and one-way functions in the random oracle model that resist a very strong form of preprocessing attack. Concretely, given a random function F :[N] [N] (accessed as an oracle) we show how to compile it into a function GF :[N 2] [N 2] which→ resists S-bit prepro- cessing attacks that run in query time T where ST = O(N 2−→ε) (assuming a corresponding data structure lower bound on 3SUM). In contrast, a classical result of Hellman tells us that F itself can be more easily inverted, say with N 2/3-bit preprocessing in N 2/3 time.
    [Show full text]
  • Human Identity and the Quest to Replace Passwords Continued
    Human identity and the quest to replace passwords continued Sirvan Almasi William J.Knottenbelt Department of Computing Department of Computing Imperial College London Imperial College London London, UK London, UK [email protected] [email protected] Abstract—Identification and authentication are vital Blockchain is proving to have many more important ap- components of many online services. For authentica- plications beyond its primary conceived application of tion, password has remained the most practical solution digital cash (Bitcoin [3] since 2009). Using it as a public- despite it being a weak form of security; whilst public- key cryptography is more secure, developing a practical key infrastructure (PKI) and identity management is two system has been an impediment to its adoption. For important examples that have tremendous implications for identification there is a lack of widely adopted protocol web applications. The likes of Namecoin [4], Blockstack [5] that isn’t dependent on trusted third parties or a and Certcoin [6] are examples of organisations attempting centralised public-key infrastructure. The Fiat–Shamir to recreate DNS, identity and certification services using identification scheme solved this issue but by assuming there was a single identity issuer to begin with, whilst blockchain. Other examples that have used the blockchain in reality you would have multiple identity issuers. as a PKI include [7] for IoT devices and [8] for identity Here we introduce deeID, a blockchain-based public- management. key infrastructure that enables multiple Fiat–Shamir The role and security of our identity in the digital identity issuers for identification. At the same time the ecosystem has taken a centre stage as the significance system is used for authentication that enables better than password security whilst remaining practical.
    [Show full text]
  • E-Cash Payment Protocols and Systems
    E-CASH PAYMENT PROTOCOLS AND SYSTEMS * MRS. J. NIMALA, Assistant Professor, PG and Research Department of Commerce with CA, Hindusthan College of Arts and Science, Coimbatore. TN INDIA ** MRS. N. MENAGA, Assistant Professor, PG and Research Department of Commerce with CA, Hindusthan College of Arts and Science, Coimbatore. TN INDIA Abstract E-cash is a payment system intended and implemented for making purchases over open networks such as the Internet. Require of a payment system which provides the electronic transactions are emergent at the similar moment that the exploit of Internet is budding in our daily life. Present days electronic payment systems have a major dilemma, they cannot switch the security and the user’s secrecy and at the same time these systems are secure on the cost of their users ambiguity. This paper shows the payment protocols for digital cash and discusses how a digital cash system can be fashioned by presenting a few of the recent day’s digital cash systems in details. We also offer a comparison and determine them mutually to see which one of them fulfils the properties for digital cash and the mandatory security level. Keywords: E-cash; Payment Protocol; Double Spending; Blind Signature. Introduction DigiCash is a private company founded in 1989 by Dr David Chaum. It has created an Internet money product, now patented, and called ‘ecash’. DigiCash’s ecash has been used for many different types of transactions. It is a stored-value cryptographic coin system that facilitates Internet-based commerce using software that runs on personal computers. It provides a way to implement anonymous electronic payments in an environment of mutual mistrust between the bank and the system users.
    [Show full text]
  • Federated Computing Research Conference, FCRC’96, Which Is David Wise, Steering Being Held May 20 - 28, 1996 at the Philadelphia Downtown Marriott
    CRA Workshop on Academic Careers Federated for Women in Computing Science 23rd Annual ACM/IEEE International Symposium on Computing Computer Architecture FCRC ‘96 ACM International Conference on Research Supercomputing ACM SIGMETRICS International Conference Conference on Measurement and Modeling of Computer Systems 28th Annual ACM Symposium on Theory of Computing 11th Annual IEEE Conference on Computational Complexity 15th Annual ACM Symposium on Principles of Distributed Computing 12th Annual ACM Symposium on Computational Geometry First ACM Workshop on Applied Computational Geometry ACM/UMIACS Workshop on Parallel Algorithms ACM SIGPLAN ‘96 Conference on Programming Language Design and Implementation ACM Workshop of Functional Languages in Introductory Computing Philadelphia Skyline SIGPLAN International Conference on Functional Programming 10th ACM Workshop on Parallel and Distributed Simulation Invited Speakers Wm. A. Wulf ACM SIGMETRICS Symposium on Burton Smith Parallel and Distributed Tools Cynthia Dwork 4th Annual ACM/IEEE Workshop on Robin Milner I/O in Parallel and Distributed Systems Randy Katz SIAM Symposium on Networks and Information Management Sponsors ACM CRA IEEE NSF May 20-28, 1996 SIAM Philadelphia, PA FCRC WELCOME Organizing Committee Mary Jane Irwin, Chair Penn State University Steve Mahaney, Vice Chair Rutgers University Alan Berenbaum, Treasurer AT&T Bell Laboratories Frank Friedman, Exhibits Temple University Sampath Kannan, Student Coordinator Univ. of Pennsylvania Welcome to the second Federated Computing Research Conference, FCRC’96, which is David Wise, Steering being held May 20 - 28, 1996 at the Philadelphia downtown Marriott. This second Indiana University FCRC follows the same model of the highly successful first conference, FCRC’93, in Janice Cuny, Careers which nine constituent conferences participated.
    [Show full text]
  • Web Search Via Hub Synthesis
    Web Search Via Hub Synthesis Dimitris Achlioptas∗ Amos Fiaty Anna R. Karlinz Frank McSherryx Small have continual plodders ever won save base authority Page [6, 25, 18] developed a highly successful search en- from others books. gine, Google [17], which orders search results according to — William Shakespeare, Loves Labours Lost. Act i. Sc. 1. PageRank, a measure of authority of the underlying page. They define themselves in terms of what they oppose. Both approaches use, chiefly, text matching to determine — George Will, On conservatives, Newsweek 30 Sep 74. the set of candidate answers to a query, and then rely on linkage information to define a ranking of these candidate Abstract web pages. Unfortunately, as every occasionally frustrated web-searcher can attest, text matching can run into trou- We present a model for web search that captures in a uni- ble with two ubiquitous phenomena: synonymy (where two fied manner three critical components of the problem: how distinct terms, like “terrorist” and “freedom-fighter”, refer the link structure of the web is generated, how the content to the same thing) and polysemy (where a single word or of a web document is generated, and how a human searcher phrase, like “bug”, has multiple distinct meanings). Syn- generates a query. The key to this unification lies in cap- onymy may cause important pages to be overlooked, while turing the correlations between these components in terms polysemy may cause authoritative pages on topics other of proximity in a shared latent semantic space. Given such than the search topic to be included. a combined model, the correct answer to a search query is Synonymy and polysemy, as problems in information well defined, and thus it becomes possible to evaluate web retrieval, long precede the advent of the web and have re- search algorithms rigorously.
    [Show full text]
  • Arxiv:1911.04124V5 [Cs.CR] 4 Aug 2021 Hra O Uhecmee Oetpriiain Hsmig This Participation
    Tuning PoW with Hybrid Expenditure Itay Tsabary Alexander Spiegleman Ittay Eyal [email protected] [email protected] [email protected] Technion, IC3 Faceook Novi Technion, IC3 Haifa, Israel Menlo Park, California, USA Haifa, Israel ABSTRACT 104, 105] that facilitate monetary ecosystems of internally-minted Proof of Work (PoW ) is a Sybil-deterrence security mechanism. It tokens, maintained by principals called miners. Miners that follow introduces an external cost to a system by requiring computational the protocol are rewarded with tokens; tokens are scarce, hence a effort to perform actions. However, since its inception, a central market forms [26, 27, 47, 111]; so, miners can sell their obtained challenge was to tune this cost. Initial designs for deterring spam tokens for fiat currency (e.g., USD, EUR), compensating them for email and DoS attacks applied overhead equally to honest partici- their PoW expenses. pants and attackers. Requiring too little effort did not deter attacks, To guarantee their security [50, 71, 128], PoW cryptocurrencies whereas too much encumbered honest participation. This might be moderate their operation rate by dynamically tuning the required the reason it was never widely adopted. computation difficulty to match miner capabilities [98, 119, 122, Nakamoto overcame this trade-off in Bitcoin by distinguishing 125]. Consequently, the PoW expenditure directly depends on to- desired from malicious behavior and introducing internal rewards ken values [15, 40, 103, 117] – higher token prices imply higher for the former. This solution gained popularity in securing cryp- mining rewards, which draw more miners to participate, leading tocurrencies and using the virtual internally-minted tokens for re- to more expended resources.
    [Show full text]
  • A Secure Message Broadcasting System (SMBS)
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 1996 A Secure Message Broadcasting System (SMBS) Mark Crosbie Ivan Krsul Steve Lodin Eugene H. Spafford Purdue University, [email protected] Report Number: 96-019 Crosbie, Mark; Krsul, Ivan; Lodin, Steve; and Spafford, Eugene H., "A Secure Message Broadcasting System (SMBS)" (1996). Department of Computer Science Technical Reports. Paper 1275. https://docs.lib.purdue.edu/cstech/1275 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. A SECURE MESSAGE BROADCAST SYSTEM (SMBS) Mark Crosbie Ivan Krsul Steve Lodin Eugene H. Spafford DepaI1ment of Computer Sciences Purdue University West LarayeHe. IN 47907 CSD TR·96-019 March 1996 i A Secure Message Broadcast System (SMBS) Mark Crosbie Ivan Krsul Steve Ladin Eugene H. Spafford" The COASTProject Department of Computer Sciences Purdue University West Lafayette, IN 47907-1398 {mcrosbie,krsul,swlodin, spal}@cs.purdue.edu Technical Report CSD-TR-96-019 March II, 1996 1 Introduction This paper describes the design and implementation of a secure message broadcast system (SMBS). It is a secure, multi­ party chat program that ensures privacy in communication and does not rely on shared secret keys. The system was built as a study of the feasibility of building effective communication tools using zero knowledge proofs. There is a general consensus in the computer security comunity thallfaditional password based authentication mech­ anisms are insuficient in loday's globally connected environment. Mechanisms such as one-time-passwords are a partial solution to the problem.
    [Show full text]
  • Protecting Communications Against Forgery
    Algorithmic Number Theory MSRI Publications Volume 44, 2008 Protecting communications against forgery DANIEL J. BERNSTEIN ABSTRACT. This paper is an introduction to cryptography. It covers secret- key message-authentication codes, unpredictable random functions, public- key secret-sharing systems, and public-key signature systems. 1. Introduction Cryptography protects communications against espionage: an eavesdropper who intercepts a message will be unable to decipher it. This is useful for many types of information: credit-card transactions, medical records, love letters. Cryptography also protects communications against sabotage: a forger who fabricates or modifies a message will be unable to deceive the receiver. This is useful for all types of information. If the receiver does not care about the authenticity of a message, why is he listening to the message in the first place? This paper explains how cryptography prevents forgery. Section 2 explains how to protect n messages if the sender and receiver share 128(n 1) secret + bits. Section 3 explains how the sender and receiver can generate many shared secret bits from a short shared secret. Section 4 explains how the sender and receiver can generate a short shared secret from a public conversation. Section 5 explains how the sender can protect a message sent to many receivers, without sharing any secrets. Mathematics Subject Classification: 94A62. Permanent ID of this document: 9774ae5a1749a7b256cc923a7ef9d4dc. Date: 2008.05.01. 535 536 DANIEL J. BERNSTEIN 2. Unbreakable secret-key authenticators Here is a protocol for transmitting a message when the sender and receiver both know certain secrets: Secrets p, k Secrets p, k Authenticated Possibly forged Message m / / / Verification message m, a message m0, a0 The message is a polynomial m F[x] with m(0) 0 and deg m 1000000.
    [Show full text]
  • Lipics-ITCS-2018-0.Pdf (0.4
    9th Innovations in Theoretical Computer Science ITCS 2018, January 11–14, 2018, Cambridge, MA, USA Edited by Anna R. Karlin LIPIcs – Vol. 94 – ITCS2018 www.dagstuhl.de/lipics Editor Anna R. Karlin Allen School of Computer Science and Engineering University of Washington [email protected] ACM Classification 1998 F. Theory of Computation, G. Mathematics of Computing ISBN 978-3-95977-060-6 Published online and open access by Schloss Dagstuhl – Leibniz-Zentrum für Informatik GmbH, Dagstuhl Publishing, Saarbrücken/Wadern, Germany. Online available at http://www.dagstuhl.de/dagpub/978-3-95977-060-6. Publication date January, 2018 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available in the Internet at http://dnb.d-nb.de. License This work is licensed under a Creative Commons Attribution 3.0 Unported license (CC-BY 3.0): http://creativecommons.org/licenses/by/3.0/legalcode. In brief, this license authorizes each and everybody to share (to copy, distribute and transmit) the work under the following conditions, without impairing or restricting the authors’ moral rights: Attribution: The work must be attributed to its authors. The copyright is retained by the corresponding authors. Digital Object Identifier: 10.4230/LIPIcs.ITCS.2018.0 ISBN 978-3-95977-060-6 ISSN 1868-8969 http://www.dagstuhl.de/lipics 0:iii LIPIcs – Leibniz International Proceedings in Informatics LIPIcs is a series of high-quality conference proceedings across all fields in informatics. LIPIcs volumes are published according to the principle of Open Access, i.e., they are available online and free of charge.
    [Show full text]
  • Formal Analysis of E-Cash Protocols∗
    Formal Analysis of E-Cash Protocols∗ Jannik Dreier1, Ali Kassem2 Pascal Lafourcade3 1Institute of Information Security, Department of Computer Science, ETH Zurich, Switzerland 2 University Grenoble Alpes, VERIMAG, Grenoble, France 3University Clermont Auvergne, LIMOS, France Keywords: E-Cash, Formal Analysis, Double Spending, Exculpability, Privacy, Applied π-Calculus, ProVerif. Abstract: Electronic cash (e-cash) aims at achieving client privacy at payment, similar to real cash. Several security protocols have been proposed to ensure privacy in e-cash, as well as the necessary unforgery properties. In this paper, we propose a formal framework to define, analyze, and verify security properties of e-cash systems. To this end, we model e-cash systems in the applied π-calculus, and we define two client privacy properties and three properties to prevent forgery. Finally, we apply our definitions to an e-cash protocol from the literature proposed by Chaum et al., which has two variants and a real implementation based on it. Using ProVerif, we demonstrate that our framework is suitable for an automated analysis of this protocol. 1 Introduction In this protocol coins are non-transferable, i.e., the seller cannot spend a received coin again, but Although current banking and electronic pay- has to deposit it at the bank. If he wants to ment systems such as credit cards or, e.g., Pay- spend a coin in another shop, he has to withdraw Pal allow clients to transfer money around the a new coin from his account, similar to the usual world in a fraction of a second, they do not fully payment using cheques.
    [Show full text]