Hard Languages in NP∩ coNP and NIZK Proofs from Unstructured Hardness

R Ghosal, Y Ishai, A Korb, E Kushilevitz, P Lou… - Proceedings of the 55th …, 2023 - dl.acm.org
The existence of “unstructured” hard languages in NP ∩ coNP is an intriguing open question.
Bennett and Gill (SICOMP, 1981) asked whether P is separated from NP ∩ coNP relative …

[BOOK][B] Limits on the Pseudorandomness of Low-Degree Polynomials over the Integers

ALW Korb - 2020 - search.proquest.com
We initiate the study of a problem called the Polynomial Independence Distinguishing
Problem (PIDP). The problem is parameterized by a set of polynomials Q=(q 1,..., qm) of n …

[HTML][HTML] Beyond the csiszár–körner bound: best-possible wiretap coding via obfuscation

Y Ishai, A Korb, P Lou, A Sahai - Journal of Cryptology, 2024 - Springer
A wiretap coding scheme (Wyner in Bell Syst Tech J 54(8):1355–1387, 1975) enables Alice
to reliably communicate a message m to an honest Bob by sending an encoding c over a …

Streaming functional encryption

J Guan, A Korb, A Sahai - Annual International Cryptology Conference, 2023 - Springer
We initiate the study of streaming functional encryption (sFE) which is designed for scenarios
in which data arrives in a streaming manner and is computed on in an iterative manner as …

Amplifying the security of functional encryption, unconditionally

A Jain, A Korb, N Manohar, A Sahai - Annual International Cryptology …, 2020 - Springer
Security amplification is a fundamental problem in cryptography. In this work, we study security
amplification for functional encryption (FE). We show two main results: For any constant $…

Hard Languages in and NIZK Proofs from Unstructured Hardness

R Ghosal, Y Ishai, A Korb, E Kushilevitz, P Lou… - Cryptology ePrint …, 2023 - eprint.iacr.org
The existence of" unstructured" hard languages in $\mathsf {NP}\,\cap\,\mathsf {coNP} $ is an
intriguing open question. Bennett and Gill (SICOMP, 1981) asked whether $\mathsf {P} $ is …

Adaptively Secure Streaming Functional Encryption

P Datta, J Guan, A Korb, A Sahai - Cryptology ePrint Archive, 2024 - eprint.iacr.org
This paper introduces the first adaptively secure streaming functional encryption (sFE)
scheme for P/Poly. sFE stands as an evolved variant of traditional functional encryption (FE), …

A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers

A Jain, A Korb, P Lou, A Sahai - Cryptology ePrint Archive, 2021 - eprint.iacr.org
We initiate the study of a problem called the Polynomial Independence Distinguishing
Problem (PIDP). The problem is parameterized by a set of polynomials $\mathcal {Q}=(q_1,\ldots, …

Expanding COVID-19 symptom screening to retail, restaurants, and schools by preserving privacy using relaxed digital signatures

B Jew, A Korb, P Lou, JN Chiang, U An, A Sahai… - medRxiv, 2020 - medrxiv.org
Symptom screening is a widely deployed strategy to mitigate the COVID-19 pandemic and
many public health authorities are mandating its use by employers for all employees in the …