No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019
    If you made any changes in Pure, your changes will be visible here soon.

    Research Output 1998 2019

    Article
    Public Key Encryption
    Cryptography
    Homomorphic
    Generalise
    Ring Signature
    Population
    Group Signature
    Identification Scheme
    Identification (control systems)

    Bottleneck links, variable demand, and the tragedy of the commons

    Cole, R., Dodis, Y. & Roughgarden, T., Oct 2012, In : Networks. 60, 3, p. 194-203 10 p.

    Research output: Contribution to journalArticle

    Costs
    Routing protocols
    Throughput
    Authenticated Encryption
    Cryptography
    Equipment and Supplies
    Paradigm
    Binders
    Extractor
    Noisy Data
    Biometrics
    Hamming distance
    Difference Set

    Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

    Dodis, Y., Ostrovsky, R., Reyzin, L. & Smith, A., 2008, In : SIAM Journal on Computing. 38, 1, p. 97-139 43 p.

    Research output: Contribution to journalArticle

    Extractor
    Noisy Data
    Biometrics
    Hamming distance
    Difference Set

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., May 2006, In : Journal of Computer and System Sciences. 72, 3, p. 444-467 24 p.

    Research output: Contribution to journalArticle

    Selfish Routing
    Tax
    Taxation
    Latency
    Costs

    How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs

    Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., Nov 14 2016, (Accepted/In press) In : Algorithmica. p. 1-37 37 p.

    Research output: Contribution to journalArticle

    Optimal Recovery
    Random number Generator
    Entropy
    Recovery
    Timing
    Entropy
    Randomness
    Extractor
    Seeds
    Seed

    Intrusion-resilient public-key encryption

    Dodis, Y., Franklin, M., Katz, J., Miyaji, A. & Yung, M., 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612, p. 19-32 14 p.

    Research output: Contribution to journalArticle

    Public Key Encryption
    Cryptography
    Encryption
    Forward Security
    Insulation

    Non-malleable codes from additive combinatorics

    Aggarwal, D., Dodis, Y. & Lovett, S., Jan 1 2018, In : SIAM Journal on Computing. 47, 2, p. 524-546 23 p.

    Research output: Contribution to journalArticle

    Additive Combinatorics
    Error detection
    Error correction
    Zero-knowledge Proof
    Vector spaces
    Entropy
    Randomness
    Extractor
    Privacy
    Amplification
    Claw-free
    Hoof and Claw
    Permutation
    Signature Scheme
    Random Oracle

    Optimistic fair exchange in a multi-user setting

    Dodis, Y., Lee, P. J. & Yum, D. H., 2008, In : Journal of Universal Computer Science. 14, 3, p. 318-346 29 p.

    Research output: Contribution to journalArticle

    Fair Exchange
    Security Model
    Cryptography
    Multisignature
    One-way Function

    Privacy amplification and nonmalleable extractors via character sums

    Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2014, In : SIAM Journal on Computing. 43, 2, p. 800-830 31 p.

    Research output: Contribution to journalArticle

    Character Sums
    Extractor
    Amplification
    Privacy
    Entropy
    Imperfect
    Randomness
    Cryptography
    Privacy
    Secret Sharing Scheme
    Broadcast Encryption
    Public Key Encryption
    Cryptography
    Receiver
    Public key
    Public key
    Trace
    Attack
    Cryptography
    Traitor Tracing
    Randomness
    Cascade
    Noise
    Seeds
    Extractor

    Robust fuzzy extractors and authenticated key agreement from close secrets

    Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L. & Smith, A., 2012, In : IEEE Transactions on Information Theory. 58, 9, p. 6207-6222 16 p., 6203415.

    Research output: Contribution to journalArticle

    entropy
    Entropy
    Biometrics
    Authentication
    biometrics

    Scalable public-key tracing and revoking

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., May 2005, In : Distributed Computing. 17, 4, p. 323-347 25 p.

    Research output: Contribution to journalArticle

    Traitor Tracing
    Public key
    Tracing
    Formal Model
    Cryptography
    Signature Scheme
    Equipment and Supplies
    Signature
    Random Oracle Model
    Cell Phones

    The cost of cryptography

    Dodis, Y., Nov 2013, Nautilus Magazine, Issue 007 ("Waste").

    Research output: Contribution to specialist publicationArticle

    Chapter

    Cryptography and game theory

    Dodis, Y. & Rabin, T., Jan 1 2007, Algorithmic Game Theory. Cambridge University Press, p. 181-206 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Game theory
    Cryptography

    Designing networks with bounded pairwise distance

    Dodis, Y. & Khanna, S., 1999, Conference Proceedings of the Annual ACM Symposium on Theory of Computing. ACM, p. 750-759 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Costs
    Approximation algorithms
    Linear programming
    Telecommunication networks
    Hardness

    Forward-secure hierarchical IBE with applications to broadcast encryption

    Yao, D., Fazio, N., Dodis, Y. & Lysyanskaya, A., 2009, Identity-Based Cryptography. Vol. 2. p. 100-118 19 p. (Cryptology and Information Security Series; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Cryptography
    Access control
    Joining

    Fuzzy extractors

    Dodis, Y., Reyzin, L. & Smith, A., 2007, Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer London, p. 79-99 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Biometrics
    Chapter (peer-reviewed)

    Concealment and its applications to authenticated encryption

    Dodis, Y., 2010, Practical signcryption. Dent, A. & Zheng, Y. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

    Forward-secure hierarchical IBE with applications to broadcast encryption schemes

    Dodis, Y., Yao, D., Fazio, N. & Lysyanskaya, A., 2008, Identity-based cryptography. Joye, M. & Neven, G. (eds.). IOS Press, (Cryptology and Information Security Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

    Conference contribution

    2-Catalog segmentation problem

    Dodis, Y., Guruswami, V. & Khanna, S., 1999, Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. Anon (ed.). SIAM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Approximation algorithms
    Segmentation
    Subset
    Approximation Algorithms
    Trivial

    A cryptographic solution to a game theoretic problem

    Dodis, Y., Halevi, S. & Rabin, T., 2000, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Springer Verlag, Vol. 1880. p. 112-130 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Game
    Communication
    Cryptographic Protocols
    Mediator

    A domain extender for the ideal cipher

    Coron, J. S., Dodis, Y., Mandal, A. & Seurin, Y., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. Vol. 5978 LNCS. p. 273-289 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Oracle
    Block Cipher
    Standard Model
    Attack

    A formal treatment of backdoored pseudorandom generators

    Dodis, Y., Ganesh, C., Golovnev, A., Juels, A. & Ristenpart, T., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9056. p. 101-126 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Pseudorandom Generator
    Hash functions
    Cryptography
    Hash Function
    Output

    Amplifying privacy in privacy amplification

    Aggarwal, D., Dodis, Y., Jafargholi, Z., Miles, E. & Reyzin, L., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, Vol. 8617 LNCS. p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Amplification
    Privacy
    Entropy
    Entropy Loss
    Retrieval

    A new design criteria for hash-functions

    Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005, NIST Cryptographic Hash Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A new distribution-sensitive secure sketch and popularity-proportional hashing

    Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Springer Verlag, Vol. 10403 LNCS. p. 682-710 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hashing
    Directly proportional
    Password
    Authentication
    Hash functions

    A new mode of operation for block ciphers and length-preserving MACs

    Dodis, Y., Pietrzak, K. & Puniya, P., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 4965 LNCS. p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Block Ciphers
    Modes of Operation
    Hash functions
    Block Cipher
    Even permutation

    A verifiable random function with short proofs and keys

    Dodis, Y. & Yampolskiy, A., 2005, Lecture Notes in Computer Science. Vaudenay, S. (ed.). Vol. 3386. p. 416-431 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions

    Bottleneck links, variable demand, and the tragedy of the commons

    Cole, R., Dodis, Y. & Roughgarden, T., 2006, Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms. p. 668-677 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Price of Anarchy
    Agglomeration
    Aggregation Function
    Resources
    Norm

    Breaking and repairing optimistic fair exchange from PODC 2003

    Dodis, Y. & Reyzin, L., 2003, DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management. Yung, M. (ed.). p. 47-54 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Changing base without losing space

    Dodis, Y., Patrascu, M. & Thorup, M., 2010, STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 593-602 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Authentication
    Decoding
    Data structures
    Hardness

    Chosen-ciphertext security of multiple encryption

    Dodis, Y. & Katz, J., 2005, Lecture Notes in Computer Science. Kilian, J. (ed.). Vol. 3378. p. 188-209 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography

    Composability and on-line deniability of authentication

    Dodis, Y., Katz, J., Smith, A. & Walfish, S., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. Vol. 5444 LNCS. p. 146-162 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authentication
    Universal Composability
    Message Authentication
    Completion
    Receiver

    Correcting errors without leaking partial information

    Dodis, Y. & Smith, A., 2005, Proceedings of the Annual ACM Symposium on Theory of Computing. p. 654-663 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropy
    Hash functions
    Error correction

    Counterexamples to hardness amplification beyond negligible

    Dodis, Y., Jain, A., Moran, T. & Wichs, D., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. Vol. 7194 LNCS. p. 476-493 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Amplification
    Hardness
    Direct Product
    Counterexample
    One-way Function

    Cryptography against continuous memory attacks

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., 2010, Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010. p. 511-520 10 p. 5671302

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Data storage equipment

    Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

    Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 4965 LNCS. p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Extractor
    Secret Sharing
    Manipulation
    Equipment and Supplies
    Secret Sharing Scheme

    Differential privacy with imperfect randomness

    Dodis, Y., López-Alt, A., Mironov, I. & Vadhan, S., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. Vol. 7417 LNCS. p. 497-516 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Imperfect
    Randomness
    Privacy
    Additive noise
    Cryptography