
180 Park Ave - Building 103
Florham Park, NJ 07093
Subject matter expert in cryptography, cryptographic protocols and schemes, secure multi-party computation, privacy-preserving computation, distributed consistency and decision problems.
Note:
This page is still under construction. See my old Bell Labs page for more information.
Short Bio
- September 2008-Present: Lead Member of Technical Staff, AT&T Labs -- Research.
- April 1998-August 2008: Member of Technical Staff, Bell Labs. Member of the Security Research Department, Enabling Computing Technologies Domain. Previously, member of the Computing Sciences Research Center.
- June 1990-March 1998: Research Staff Member, IBM T.J. Watson Research Center. Co-founder of the Network Security Group (currently the Cryptography Research Group).
- 1996: Visiting Scientist, Centrum voor Wiskunde en Informatica (CWI), Amsterdam, The Netherlands.
- 1992: Postdoctoral Felow, Department of Applied Math and Computer Science, The Weizmann Institute of Science, Rehovot, Israel.
- 1989-1990: Visiting Assistant Professor, Dept. of Computer Science, Bucknell University, Lewisburg, PA.
- 1984-1989: Ph.D. in Computer Science at Penn State, University Park, PA. Adviser: Prof. Piotr Berman.
- Before:
- EE Master's from the Philips/Eindhoven International Institute, Netherlands Universities Foundation, Eindhoven, Holland;
- Systems Engineer, IBM Argentina;
- Electrical Engineering degree from University of Rosario, Argentina.

Resource-Based Corruptions and the Combinatorics of Hidden Diversity
David Johnson, Juan Garay, Aggelos Kiayias, Moti Yung
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer Science, pp 4,
2013.
[PDF]
[BIB]
ACM Copyright
(c) ACM, 2012. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in 2012 , 2013-01-10.
{In the setting of cryptographic protocols, the corruption of a party
has been viewed as a simple, uniform and atomic operation, where the adversary decides to
get control over a party and this party immediately gets
corrupted. In this paper, motivated by the fact that different
players may require different resources to get corrupted, we put forth
the notion of {em resource-based corruptions}, where the adversary
must invest some resources in order to do so.
If the adversary has full information about the system configuration
then resource-based corruptions would provide no fundamental
difference from the standard corruption model. However, in a
{em resource anonymous} setting,
in the sense that such configuration is hidden from the
adversary, much is to be gained in terms of efficiency and
security.
We showcase the power of anonymity in the setting of secure multiparty
computation (MPC) with resource-based corruptions and prove that
anonymity can effectively be used to circumvent known impossibility
results. Specifically, if $OPT$ is the corruption budget that violates
the completeness of MPC (the case when half or more of the players are
corrupted), we show that by using anonymity, the completeness of MPC can
be made to hold against an adversary with as much as a $Bcdot OPT$
budget, for any constant $B>1$. This result requires a suitable choice
of parameters (in terms of number of players and their hardness to
corrupt), which we provide and further prove other tight variants of
the result when the said choice is not available. Regarding efficiency
gains, we show that anonymity can be used to force the corruption
threshold to drop from 1/2 to 1/3, in turn allowing the use of much
more efficient (information-theoretic) MPC protocols.
We achieve the above through a series of technical contributions:
- the formulation of the notion of {em inversion effort preserving} (IEP)
functions which is a type of direct-sum property, and the property of
{em hardness indistinguishability}.
While hardness indistinguishability enables the dissociation of
parties' identities and the resources needed to corrupt them, IEP
enables the discretization of adversarial work into corruption tokens;
- the modeling of the corruption process in the setting of MPC through
{em corruption oracles} as well as the introduction of a notion of
reduction to relate such oracles;
- the abstraction of the corruption game as a combinatorial problem
and its analysis,
all of which may be of independent interest.
}