- About
- Events
- Calendar
- Graduation Information
- Cornell Learning Machines Seminar
- Student Colloquium
- BOOM
- Spring 2025 Colloquium
- Conway-Walker Lecture Series
- Salton 2024 Lecture Series
- Seminars / Lectures
- Big Red Hacks
- Cornell University / Cornell Tech - High School Programming Workshop and Contest 2025
- Game Design Initiative
- CSMore: The Rising Sophomore Summer Program in Computer Science
- Explore CS Research
- ACSU Research Night
- Cornell Junior Theorists' Workshop 2024
- People
- Courses
- Research
- Undergraduate
- M Eng
- MS
- PhD
- Admissions
- Current Students
- Computer Science Graduate Office Hours
- Advising Guide for Research Students
- Business Card Policy
- Cornell Tech
- Curricular Practical Training
- A & B Exam Scheduling Guidelines
- Fellowship Opportunities
- Field of Computer Science Ph.D. Student Handbook
- Graduate TA Handbook
- Field A Exam Summary Form
- Graduate School Forms
- Instructor / TA Application
- Ph.D. Requirements
- Ph.D. Student Financial Support
- Special Committee Selection
- Travel Funding Opportunities
- Travel Reimbursement Guide
- The Outside Minor Requirement
- Diversity and Inclusion
- Graduation Information
- CS Graduate Minor
- Outreach Opportunities
- Parental Accommodation Policy
- Special Masters
- Student Spotlights
- Contact PhD Office
Extractors and Secret Sharing Against Bounded Collusion Protocols (via Zoom)
Abstract: Bounded collusion protocols (BCPs) are multiparty communication protocols in which N players, holding n bits each, wish to compute some joint function f : ({0,1}^n)^N —> {0,1}. In each round, p players are allowed to work together to write a single bit on a public blackboard, and the protocol continues until everyone knows the value of f.
BCPs are a natural generalization of the well studied number-in-hand (NIH) and number-on-forehead (NOF) models, which are just endpoints on this rich spectrum (corresponding to p=1 and p=N-1, respectively). In this talk, we will investigate BCPs more thoroughly, and answer questions about them in the context of communication complexity, pseudorandomness, and cryptography.
Our investigation will culminate in the explicit construction of three related objects: (1) functions with strong *lower bounds* against BCPs, (2) leakage-resilient *extractors* against BCPs, and (3) leakage-resilient *secret sharing schemes* against BCPs. Our constructions are simple, and provide an exponential improvement over the previous best results [Kumar-Meka-Sahai, FOCS 2019].
This work appeared in FOCS 2020, and is joint with Eshan Chattopadhyay, Vipul Goyal, Ashutosh Kumar, Xin Li, Raghu Meka, and David Zuckerman.
Bio: Jesse Goodman is a third year CS PhD student at Cornell, where he is advised by Eshan Chattopadhyay. Previously, he received his BSE from Princeton. His primary interests lie in combinatorics, complexity theory, and pseudorandomness.