Daniel Wichs

From MaRDI portal
Revision as of 13:14, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:315545

Available identifiers

zbMath Open wichs.danielMaRDI QIDQ315545

List of research outcomes





PublicationDate of PublicationType
Laconic function evaluation and ABE for RAMs from (Ring-)LWE2024-12-13Paper
Doubly efficient cryptography: commitments, arguments and RAM MPC2024-12-13Paper
PIR with client-side preprocessing: information-theoretic constructions and lower bounds2024-12-13Paper
Laconic function evaluation, functional encryption and obfuscation for RAMs with sublinear computation2024-11-12Paper
Security with functional re-encryption from CPA2024-08-02Paper
Lower bounds on anonymous whistleblowing2024-08-02Paper
Multi-instance randomness extraction and security against bounded-storage mass surveillance2024-08-02Paper
Refuting the dream XOR lemma via ideal obfuscation and resettable MPC2024-06-25Paper
Doubly efficient private information retrieval and fully homomorphic RAM computation from ring LWE2024-05-08Paper
Boosting batch arguments and RAM delegation2024-05-08Paper
https://portal.mardi4nfdi.de/entity/Q61262892024-04-09Paper
The pseudorandom oracle model and ideal obfuscation2024-02-06Paper
Universal amplification of KDM security: from 1-key circular to multi-key KDM2024-02-02Paper
Speak much, remember little: cryptography in the bounded storage model, revisited2024-01-16Paper
A map of witness maps: new definitions and connections2023-11-16Paper
Witness encryption and null-iO from evasive LWE2023-08-25Paper
Post-quantum insecurity from LWE2023-08-14Paper
Nearly optimal property preserving hashing2023-06-30Paper
Succinct LWE sampling, random polynomials, and obfuscation2023-04-13Paper
Updatable public key encryption in the standard model2023-04-13Paper
Adaptively secure MPC with sublinear communication complexity2023-04-13Paper
Leakage-resilient key exchange and two-seed extractors2022-11-09Paper
Incompressible encodings2022-11-09Paper
Witness Maps and Applications2022-10-13Paper
Incompressible cryptography2022-08-30Paper
Authentication in the bounded storage model2022-08-30Paper
Targeted lossy functions and applications2022-05-18Paper
Limits on the adaptive security of Yao's garbling2022-04-22Paper
Two-round oblivious transfer from CDH or LPN2022-03-23Paper
Candidate obfuscation via oblivious LWE sampling2021-12-08Paper
Extracting randomness from extractor-dependent sources2021-12-01Paper
Statistical ZAPR arguments from bilinear maps2021-12-01Paper
Optimal broadcast encryption from LWE and pairings in the standard model2021-12-01Paper
Is there an oblivious RAM lower bound for online reads?2021-07-02Paper
Non-malleable codes for decision trees2020-05-20Paper
On the plausibility of fully homomorphic encryption for RAMs2020-05-20Paper
From cryptomania to obfustopia through secret-key functional encryption2020-04-28Paper
New constructions of reusable designated-verifier NIZKs2020-03-09Paper
Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions2020-03-09Paper
Adaptively secure MPC with sublinear communication complexity2020-03-09Paper
Private anonymous data access2020-02-06Paper
Reusable designated-verifier NIZKs for all NP from CDH2020-02-06Paper
Worst-case hardness for LPN and cryptographic hashing via code smoothing2020-02-04Paper
Fiat-Shamir: from practice to theory2020-01-30Paper
Succinct delegation for low-space non-deterministic computation2019-08-22Paper
Traitor-tracing from LWE made simple and attribute-based2018-12-06Paper
Watermarking PRFs under standard assumptions: public marking and security with extraction queries2018-12-06Paper
Non-Malleable Codes2018-12-06Paper
Is there an oblivious RAM lower bound for online reads?2018-12-06Paper
Watermarking Cryptographic Capabilities2018-12-05Paper
Non-trivial witness encryption and null-iO from standard assumptions2018-10-17Paper
Hardness of non-interactive differential privacy from one-way functions2018-09-12Paper
Multi-key searchable encryption, revisited2018-05-16Paper
The edited truth2018-01-19Paper
Adaptively indistinguishable garbled circuits2018-01-19Paper
How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs2018-01-05Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input2018-01-05Paper
Be adaptive, avoid overcommitting2017-11-03Paper
Watermarking cryptographic capabilities2017-09-29Paper
On the Communication Complexity of Secure Function Evaluation with Long Output2017-05-19Paper
Barriers in cryptography with weak, correlated and leaky sources2017-05-16Paper
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits2017-04-28Paper
Dynamic proofs of retrievability via oblivious RAM2017-03-02Paper
Standard Security Does Not Imply Indistinguishability Under Selective Opening2016-12-22Paper
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption2016-12-22Paper
Adaptive Security of Yao’s Garbled Circuits2016-12-21Paper
Spooky Encryption and Its Applications2016-11-09Paper
Adaptively Secure Garbled Circuits from One-Way Functions2016-11-09Paper
A counterexample to the chain rule for conditional HILL entropy2016-10-28Paper
Leakage-resilient cryptography from minimal assumptions2016-09-21Paper
Essentially Optimal Robust Secret Sharing with Maximal Corruptions2016-09-09Paper
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key2016-07-15Paper
Two Round Multiparty Computation via Multi-key FHE2016-07-15Paper
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators2016-06-10Paper
Obfuscating Conjunctions under Entropic Ring LWE2016-04-15Paper
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM2016-04-08Paper
Perfect Structure on the Edge of Chaos2016-03-23Paper
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions2015-08-27Paper
Leveled Fully Homomorphic Signatures from Standard Lattices2015-08-21Paper
Tamper Detection and Continuous Non-malleable Codes2015-07-06Paper
Non-malleable extractors and symmetric key cryptography from weak secrets2015-02-04Paper
Optimizing ORAM and Using It Efficiently for Secure Computation2014-08-19Paper
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input2014-08-07Paper
How to Eat Your Entropy and Have It Too – Optimal Recovery Strategies for Compromised RNGs2014-08-07Paper
Separating succinct non-interactive arguments from all falsifiable assumptions2014-06-05Paper
Key Derivation without Entropy Waste2014-05-27Paper
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits2014-05-27Paper
Garbled RAM Revisited2014-05-27Paper
Fully Homomorphic Message Authenticators2013-12-10Paper
On Continual Leakage of Discrete Log Representations2013-12-10Paper
Learning with Rounding, Revisited2013-09-02Paper
Fully leakage-resilient signatures2013-08-01Paper
Leakage-Resilient Cryptography from Minimal Assumptions2013-05-31Paper
Dynamic Proofs of Retrievability via Oblivious RAM2013-05-31Paper
Why “Fiat-Shamir for Proofs” Lacks a Proof2013-03-18Paper
Message Authentication, Revisited2012-06-29Paper
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE2012-06-29Paper
Counterexamples to Hardness Amplification beyond Negligible2012-06-15Paper
Key-Evolution Schemes Resilient to Space-Bounded Leakage2011-08-12Paper
Fully Leakage-Resilient Signatures2011-05-27Paper
One-Time Computable Self-erasing Functions2011-05-19Paper
Efficient Public-Key Cryptography in the Presence of Key Leakage2010-12-07Paper
Survey: Leakage Resilience and the Bounded Retrieval Model2010-09-29Paper
Public-Key Encryption in the Bounded-Retrieval Model2010-06-01Paper
On Symmetric Encryption and Point Obfuscation2010-02-24Paper
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model2009-10-20Paper
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer2009-10-20Paper
Proofs of Retrievability via Hardness Amplification2009-03-03Paper
Universally Composable Multiparty Computation with Partially Isolated Parties2009-03-03Paper
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors2008-04-15Paper
Isolated Proofs of Knowledge and Isolated Zero Knowledge2008-04-15Paper

Research outcomes over time

This page was built for person: Daniel Wichs