Private matching (PM) is a key cryptographic primitive in secure computation that allows several parties to jointly compute some functions depending on their private inputs. Indeed, this primitive has many practical applications. For instance, in online advertising, two companies may wish to find their common customers for a joint marketing...
Fisheries management that is based on quantitative assessment has commonly relied on estimating the unfished biomass of a fished stock to compare current and historical population size. Developing predictive models for this requires many years of catch and abundance data. Smaller, new, or mainly recreational fisheries may not have the...
Secure two-party computation (2PC) is the task of performing arbitrary calculations on secret inputs provided by two parties, while maintaining secrecy if at least one party is honest. 2PC has been applied to privacy-preserving record linkage and machine learning, in areas such as medicine where maintaining privacy is crucial. One...
A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...
One of the pervasive problems arising in our modern, digital world surrounds data breaches where an adversary, through zero-day exploitations, phishing, or old-fashioned social engineering attacks, gains access to a service’s data stores. Our society increasingly relies on these cloud-based services for everything from our taxes to personal communication. As...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...
In this dissertation I explore the Arms representation and activities for teaching quantum mechanics invented at Oregon State University. In the Arms representation students embody quantum states. The Arms activities are presented as an exemplar of the unique physics classroom culture of the upper-division Paradigms in Physics program. In the...
Given the many significant roles that bacteria play in modern food manufacturing, it is crucial that we have a fundamental understanding of how bacterial communities assemble and behave in the food manufacturing environment. The focus of this dissertation was to investigate both the spatial and temporal distributions of microbial communities...
Gamma Ray Bursts (GRBs) are the most energetic explosions in the Universe, producing up to $\sim10^{53}$ ergs of energy in the first few seconds of their emission -- the so-called prompt phase that is dominated by high energy X-ray and $\gamma$-ray photons. The very large luminosities released in these events...