Cryptography

How do we secure the seemingly infinite stream of data, public and personal, on the internet – and how do we ensure that the interactions we facilitate are safe from malice?

Cryptography is at the core of safeguarding data transmission, delivery processing and storage. It not only protects data from theft or alteration, but can also be used for user authentication. The UCLA Connection Lab is researching various facets of cryptography to ensure the integrity of the internet.

Inventory Auctions via Function Secret Sharing

An inventory auction is a game in which each player wishes to either buy or sell some amount of a…

PARSEC: Private AggRegate Statistics from sharE Conversion  

Recent advances in MPC have allowed for systems which privately compute aggregate statistics on inputs from many players. We have…

Improved Zero Knowledge ZK-PCP from MPC

“MPC in the head” is a well-known cryptographic technique for constructing a probabilistically-checkable zero-knowledge proof (PCP) out of an MPC…

Verifiably Hard Functions

Computer science tools, particularly cryptographic tools, depend on some underlying function which is difficult to compute. This is of particular…

Efficient Private Learning

Recent advances in MPC have allowed for systems which compute aggregate statistics on inputs from many players. We have noticed,…

Identifying Adversaries

The goal of multi-party computation (MPC) is to compute a function taking multiple parties’ private inputs without revealing those inputs…

Loading...