Zvika Brakerski

From MaRDI portal
Revision as of 03:01, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:514474

Available identifiers

zbMath Open brakerski.zvikaMaRDI QIDQ514474

List of research outcomes





PublicationDate of PublicationType
On algebraic embedding for unstructured lattices2024-11-12Paper
On the computational hardness needed for quantum cryptography2024-09-25Paper
Pseudorandomness with proof of destruction and applications2024-08-15Paper
Factoring and pairings are not necessary for iO: circular-secure LWE suffices2024-06-24Paper
Lattice problems beyond polynomial time2024-05-08Paper
https://portal.mardi4nfdi.de/entity/Q61262542024-04-09Paper
Black-hole radiation decoding is quantum cryptography2024-02-06Paper
Simple tests of quantumness also certify qubits2024-02-06Paper
SNARGs for monotone policy batch NP2024-02-02Paper
Quantum garbled circuits2023-12-08Paper
https://portal.mardi4nfdi.de/entity/Q60909042023-11-20Paper
Candidate iO from homomorphic encryption schemes2023-07-26Paper
Constructive post-quantum reductions2023-06-30Paper
Classical binding for quantum commitments2023-03-31Paper
https://portal.mardi4nfdi.de/entity/Q58743922023-02-07Paper
https://portal.mardi4nfdi.de/entity/Q58757782023-02-03Paper
A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device2022-12-08Paper
NIZK from LPN and trapdoor hash via correlation intractability for approximable relations2022-12-07Paper
Scalable pseudorandom quantum states2022-11-09Paper
Batch-OT with optimal rate2022-08-30Paper
Impossibility of quantum virtual black-box obfuscation of classical circuits2022-03-31Paper
Hardness of LWE on general entropic distributions2022-03-23Paper
Candidate iO from homomorphic encryption schemes2021-12-01Paper
Witness indistinguishability for any single-round argument with applications to access control2021-12-01Paper
Lossiness and entropic hardness for ring-LWE2021-12-01Paper
Constant ciphertext-rate non-committing encryption from standard assumptions2021-12-01Paper
FHE-based bootstrapping of designated-prover NIZK2021-12-01Paper
https://portal.mardi4nfdi.de/entity/Q50027892021-07-28Paper
Obfuscating circuits via composite-order graded encoding2021-07-02Paper
Perfect Secure Computation in Two Rounds2021-02-08Paper
Quantum FHE (almost) as secure as classical2020-06-30Paper
Order-LWE and the hardness of ring-LWE with entropic secrets2020-05-05Paper
(Pseudo) random quantum states with binary phase2020-04-30Paper
Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles2020-04-30Paper
Degree 2 is complete for the round-complexity of malicious MPC2020-02-06Paper
On quantum advantage in information theoretic single-server PIR2020-02-04Paper
Worst-case hardness for LPN and cryptographic hashing via code smoothing2020-02-04Paper
Fast Algorithms for Interactive Coding2019-05-15Paper
Perfect secure computation in two rounds2018-12-11Paper
Two-message statistically sender-private OT from LWE2018-12-06Paper
Zero-knowledge protocols for search problems2018-10-17Paper
Non-trivial witness encryption and null-iO from standard assumptions2018-10-17Paper
Anonymous IBE, leakage resilience and circular security from new assumptions2018-07-09Paper
Limits on low-degree pseudorandom generators (or: sum-of-squares meets program obfuscation)2018-07-09Paper
Learning with errors and extrapolated dihedral cosets2018-05-29Paper
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions2018-05-28Paper
https://portal.mardi4nfdi.de/entity/Q46380572018-05-03Paper
Function-private functional encryption in the private-key setting2018-04-26Paper
Succinct spooky free compilers are not black box sound2018-02-23Paper
Private constrained PRFs (and more) from LWE2018-01-19Paper
Four round secure computation without setup2018-01-19Paper
Non-interactive delegation and batch NP verification from standard computational assumptions2017-08-17Paper
FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime2017-06-13Paper
Lattice-based FHE as secure as PKE2017-05-19Paper
Black-box obfuscation for d-CNFs2017-05-19Paper
Obfuscating conjunctions2017-03-02Paper
Targeted Homomorphic Attribute-Based Encryption2016-12-22Paper
3-Message Zero Knowledge Against Human Ignorance2016-12-21Paper
Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts2016-11-30Paper
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security2016-11-09Paper
On Statistically Secure Obfuscation with Approximate Correctness2016-10-27Paper
(Leveled) Fully Homomorphic Encryption without Bootstrapping2016-10-24Paper
Shorter Circuit Obfuscation in Challenging Security Models2016-10-21Paper
(Leveled) fully homomorphic encryption without bootstrapping2016-10-07Paper
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions2016-07-15Paper
Obfuscating Conjunctions under Entropic Ring LWE2016-04-15Paper
From Selective to Adaptive Security in Functional Encryption2015-12-10Paper
Fast Interactive Coding against Adversarial Noise2015-08-14Paper
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions2015-07-06Paper
Function-Private Functional Encryption in the Private-Key Setting2015-07-06Paper
Obfuscating Circuits via Composite-Order Graded Encoding2015-07-06Paper
Better security for deterministic public-key encryption: the auxiliary-input setting2014-09-25Paper
Classical hardness of learning with errors2014-08-07Paper
Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$2014-07-30Paper
Efficient Fully Homomorphic Encryption from (Standard) LWE2014-07-30Paper
General perfectly periodic scheduling2014-07-25Paper
(Leveled) Fully Homomorphic Encryption without Bootstrapping2014-07-01Paper
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding2014-02-18Paper
Obfuscating Conjunctions2013-09-17Paper
Packed Ciphertexts in LWE-Based Homomorphic Encryption2013-04-19Paper
When Homomorphism Becomes a Liability2013-03-18Paper
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP2012-09-25Paper
A Parallel Repetition Theorem for Leakage Resilience2012-06-15Paper
Distributed discovery of large near-cliques2012-02-06Paper
From Absolute Distinguishability to Positive Distinguishability2011-08-19Paper
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages2011-08-12Paper
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting2011-08-12Paper
Black-Box Circular-Secure Encryption beyond Affine Functions2011-05-19Paper
Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions2011-05-19Paper
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability2010-08-24Paper
Hedged Public-Key Encryption: How to Protect against Bad Randomness2009-12-15Paper
Distributed Discovery of Large Near-Cliques2009-11-19Paper
Weak Verifiable Random Functions2009-03-03Paper
General perfectly periodic scheduling2006-08-11Paper
Dispatching in perfectly-periodic schedules2004-03-14Paper

Research outcomes over time

This page was built for person: Zvika Brakerski