EE Seminar: Exploiting Computationally Bounded Adversaries in New Domains
הרישום לסמינר יבוצע בתחילת הסמינר באמצעות סריקת הברקוד למודל (יש להיכנס לפני כן למודל, לא באמצעות האפליקציה)
Registration to the seminar is done at the beginning of the seminar by scanning the barcode for the Moodle (Please enter ahead to the Moodle, NOT by application)
(The talk will be given in English)
Speaker: Dr. Jad Silbak
MIT CSAIL Cryptography Group
|
011 hall, Electrical Engineering-Kitot Building |
Monday, January 5th, 2026
13:00 - 14:00
|
|
Exploiting Computationally Bounded Adversaries in New Domains
Abstract
A central insight of modern cryptography is that to guarantee the security and integrity of a task, it often suffices to defend against computationally bounded adversaries. This perspective aligns with how we model real world attackers and can enable outcomes that are provably impossible against unbounded adversaries. Although this idea has long been a driving force in cryptography and complexity theory, it has not been fully exploited in several natural and fundamental problems that have traditionally been studied in the unbounded adversary model.
In this talk, we show that adopting this computational perspective enables us to surpass information theoretic limits in three classic settings: communication, randomness, and privacy.
- Communication: We construct efficient error correcting codes for computationally bounded adversaries that achieve information rates provably higher than those possible against unbounded adversaries.
- Randomness: While seedless deterministic extraction is impossible for general sources, we show that it is possible to deterministically extract and condense randomness from efficiently samplable sources.
- Privacy: We consider two party differential privacy and show that achieving accuracy beyond information theoretic limits is tightly connected to cryptographic power, yielding a characterization of the computational assumptions that are necessary.
Short Bio
Jad Silbak is a postdoctoral fellow in the MIT CSAIL cryptography group, hosted by Yael Tauman Kalai and Vinod Vaikuntanathan. Previously, he was a Simons Institute Postdoctoral Fellow as part of the Simons Institute Summer 2025 program on cryptography, and he spent two years at Northeastern University as a Khoury College Distinguished Postdoctoral Fellow, hosted by Daniel Wichs. Jad received his PhD in computer science from Tel Aviv University, advised by Professor Iftach Haitner and Professor Ronen Shaltiel. His research is in cryptography and complexity theory, focusing on how computational limits can be leveraged to go beyond classical information theoretic barriers
-סמינר זה ייחשב כסמינר שמיעה לתלמידי תואר שני ושלישי-
This Seminar Is Considered A Hearing Seminar For Msc/Phd Students-

