Award Abstract # 0716790
CT-ISG: Amplifying both security and reliability

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF CALIFORNIA, SAN DIEGO
Initial Amendment Date: August 14, 2007
Latest Amendment Date: July 23, 2009
Award Number: 0716790
Award Instrument: Continuing Grant
Program Manager: Nina Amla
namla@nsf.gov
 (703)292-7991
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: August 1, 2007
End Date: July 31, 2011 (Estimated)
Total Intended Award Amount: $398,600.00
Total Awarded Amount to Date: $398,600.00
Funds Obligated to Date: FY 2007 = $200,000.00
FY 2008 = $100,000.00

FY 2009 = $98,600.00
History of Investigator:
  • Russell Impagliazzo (Principal Investigator)
    russell@cs.ucsd.edu
Recipient Sponsored Research Office: University of California-San Diego
9500 GILMAN DR
LA JOLLA
CA  US  92093-0021
(858)534-4896
Sponsor Congressional District: 50
Primary Place of Performance: University of California-San Diego
9500 GILMAN DR
LA JOLLA
CA  US  92093-0021
Primary Place of Performance
Congressional District:
50
Unique Entity Identifier (UEI): UYTTZT6G9DT1
Parent UEI:
NSF Program(s): THEORY OF COMPUTING,
CYBER TRUST,
TRUSTWORTHY COMPUTING
Primary Program Source: app-0107 
01000809DB NSF RESEARCH & RELATED ACTIVIT

01000910DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): HPCC, 9218
Program Element Code(s): 286000, 737100, 779500
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Over the next few years, the basic architecture of the next generation of Internet will be decided, hopefully with a much greater emphasis on security. In a network, security and communication are interdependent. Cryptographic tools will be required to ensure that communication is dependable despite hackers' denial-of-service attacks and other sabotage. On the other hand, proper communications architecture could provide primitives that make powerful cryptographic tools for security, such as secure multiparty computation, e_cient enough to be implemented. Unfortunately, research on reliable communications and computation in a network has traditionally been studied without consideration of security, and vice versa. This research examines a model of communication channels that includes security considerations in a robust way. In this model, protocols can be simultaneously evaluated for the two dual objectives of secrecy and reliability. This model unites previous approaches to these questions from the points of view of cryptography, distributed systems, and error-correction. The model also unites information-theoretic techniques (with security based on the attacker's inability to access certain information) with complexitytheoretic approaches (based on the attacker's inability to solve intractable computational problems). Possible constructions of channels with stronger properties (increased privacy, authentication, or reliability) from those with weaker properties will be explored. For example, is it possible to take an arbitrary channel that gives only slightly more information to the intended receiver than to an attacker and use it to build a highly reliable and almost completely secret channel? Can we use a channel for secret, reliable communication to create a channel emulating a virtual broadcast? What is the relationship between secrecy and anonymity?

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Fortnow, L; Impagliazzo, R; Kabanets, V; Umans, C "On the complexity of succinct zero-sum games" COMPUTATIONAL COMPLEXITY , v.17 , 2008 , p.353 View record at Web of Science 10.1007/s00037-008-0252-
Impagliazzo, R; Jaiswal, R; Kabanets, V "Chernoff-Type Direct Product Theorems" JOURNAL OF CRYPTOLOGY , v.22 , 2009 , p.75 View record at Web of Science 10.1007/s00145-008-9029-
Impagliazzo, R; Jaiswal, R; Kabanets, V; Wigderson, A "UNIFORM DIRECT PRODUCT THEOREMS: SIMPLIFIED, OPTIMIZED, AND DERANDOMIZED" SIAM JOURNAL ON COMPUTING , v.39 , 2010 , p.1637 View record at Web of Science 10.1137/08073403
Impagliazzo, R; Moser, P "A zero-one law for RP and derandomization of AM if NP is not small" INFORMATION AND COMPUTATION , v.207 , 2009 , p.787 View record at Web of Science 10.1016/j.ic.2009.02.00
Rusell Impagliazzo, Ragesh Jaiswal and Valentine Kabanets "Chernoff-Type Direct Product Theorems." Proceedings, IACR CRYPTO 2007 , v.27 , 2007 , p.500
Rusell Impagliazzo, Ragesh Jaiswal , Valentine Kabanets and Avi Wigderson "Uniform direct product theorems: simplified, optimized and derandomized" Symposium on the Theory of Computing (STOC) , v.40 , 2008 , p.579
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets "Approximate List-Decoding of Direct Product Codes and Uniform Hardness Amplification." SIAM J. Comput. , v.39 , 2009 , p.564

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page