Research interests: Cryptography, Cybersecurity
In particular, cryptographic protocols based on coding and correlated randomness, including:
- Post-quantum (computational) cryptography, including:
- Code-based public-key encryption and digital signatures.
- Code-based zero-knowledge protocols
- Information-theoretic cryptography, including:
- Cheater-identifiable / robust / verifiable secret sharing.
- Physical-layer key agreement in wireless networks.
- Bit commitment and oblivious transfer from correlated randomness (noisy channels etc.)