EE Seminar: Exploiting Computationally Bounded Adversaries in New Domains

05 בינואר 2027, 13:00 
אולם 011, בניין כיתות-חשמל 
EE Seminar: Exploiting Computationally Bounded Adversaries in New Domains

הרישום לסמינר יבוצע בתחילת הסמינר באמצעות סריקת הברקוד למודל (יש להיכנס לפני כן למודל,  לא באמצעות האפליקציה)

Registration to the seminar is done at the beginning of the seminar by scanning the barcode for the Moodle (Please enter ahead to the Moodle, NOT by application)

 

(The talk will be given in English)

 

Speaker:     Dr. Jad Silbak

                       MIT CSAIL Cryptography Group

 

011 hall, Electrical Engineering-Kitot Building‏

Monday, January 5th, 2026

13:00 - 14:00

 

Exploiting Computationally Bounded Adversaries in New Domains

 

Abstract

A central insight of modern cryptography is that to guarantee the security and integrity of a task, it often suffices to defend against computationally bounded adversaries. This perspective aligns with how we model real world attackers and can enable outcomes that are provably impossible against unbounded adversaries. Although this idea has long been a driving force in cryptography and complexity theory, it has not been fully exploited in several natural and fundamental problems that have traditionally been studied in the unbounded adversary model.

In this talk, we show that adopting this computational perspective enables us to surpass information theoretic limits in three classic settings: communication, randomness, and privacy.

  • Communication: We construct efficient error correcting codes for computationally bounded adversaries that achieve information rates provably higher than those possible against unbounded adversaries.
  • Randomness: While seedless deterministic extraction is impossible for general sources, we show that it is possible to deterministically extract and condense randomness from efficiently samplable sources.
  • Privacy: We consider two party differential privacy and show that achieving accuracy beyond information theoretic limits is tightly connected to cryptographic power, yielding a characterization of the computational assumptions that are necessary.

Short Bio

Jad Silbak is a postdoctoral fellow in the MIT CSAIL cryptography group, hosted by Yael Tauman Kalai and Vinod Vaikuntanathan. Previously, he was a Simons Institute Postdoctoral Fellow as part of the Simons Institute Summer 2025 program on cryptography, and he spent two years at Northeastern University as a Khoury College Distinguished Postdoctoral Fellow, hosted by Daniel Wichs. Jad received his PhD in computer science from Tel Aviv University, advised by Professor Iftach Haitner and Professor Ronen Shaltiel. His research is in cryptography and complexity theory, focusing on how computational limits can be leveraged to go beyond classical information theoretic barriers

 

  -סמינר זה ייחשב כסמינר שמיעה לתלמידי תואר שני ושלישי-

This Seminar Is Considered A Hearing Seminar For Msc/Phd Students-

 

 

 

 

אוניברסיטת תל אביב עושה כל מאמץ לכבד זכויות יוצרים. אם בבעלותך זכויות יוצרים בתכנים שנמצאים פה ו/או השימוש שנעשה בתכנים אלה לדעתך מפר זכויות
שנעשה בתכנים אלה לדעתך מפר זכויות נא לפנות בהקדם לכתובת שכאן >>