
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | September 17, 2021 |
Latest Amendment Date: | July 15, 2024 |
Award Number: | 2140975 |
Award Instrument: | Continuing Grant |
Program Manager: |
Phillip Regalia
pregalia@nsf.gov (703)292-2981 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | August 1, 2021 |
End Date: | July 31, 2026 (Estimated) |
Total Intended Award Amount: | $500,000.00 |
Total Awarded Amount to Date: | $379,993.00 |
Funds Obligated to Date: |
FY 2022 = $98,275.00 FY 2023 = $94,392.00 FY 2024 = $116,863.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
110 INNER CAMPUS DR AUSTIN TX US 78712-1139 (512)471-6424 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
TX US 78759-5316 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | Secure &Trustworthy Cyberspace |
Primary Program Source: |
01002223DB NSF RESEARCH & RELATED ACTIVIT 01002122DB NSF RESEARCH & RELATED ACTIVIT 01002425DB NSF RESEARCH & RELATED ACTIVIT 01002324DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Modern cryptography began with the goal of protecting communications over public networks. Today, not only do we communicate with each other remotely, we also delegate our computations to cloud-based services. But can we trust the cloud? Just as cryptographic techniques developed in the last half century provided the foundation for secure communication on the Internet, new techniques provide similar mechanisms for ensuring privacy and integrity of computations. As these technologies mature and see deployment, it is important to carefully study their design and security. The focus of this project is on the theoretical foundations of cryptographic proof systems, a key primitive used to ensure privacy and integrity of computations.
This project conducts a systematic study of the theoretical foundations of cryptographic proof systems that provide privacy and minimize proof size. The focus is on constructions from general and unstructured assumptions. This newly enables cryptographic proof systems from simpler and weaker cryptographic notions. In addition, through the careful study of the foundations of cryptographic proof systems, the project expands our understanding of the broader connections between proof systems and other core cryptographic notions like public-key encryption and witness encryption. By viewing these notions through the lens of cryptographic proof systems, this project paves new paths towards realizing these primitives from simpler cryptographic assumptions. This project also develops new educational material at all levels (from K-12 students to graduate students) focused on applied cryptography and the role it plays in securing digital systems and computations.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.