Daniel Wichs

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Laconic function evaluation and ABE for RAMs from (Ring-)LWE
 
2024-12-13Paper
Doubly efficient cryptography: commitments, arguments and RAM MPC
 
2024-12-13Paper
PIR with client-side preprocessing: information-theoretic constructions and lower bounds
 
2024-12-13Paper
Laconic function evaluation, functional encryption and obfuscation for RAMs with sublinear computation
 
2024-11-12Paper
Security with functional re-encryption from CPA
 
2024-08-02Paper
Lower bounds on anonymous whistleblowing
 
2024-08-02Paper
Multi-instance randomness extraction and security against bounded-storage mass surveillance
 
2024-08-02Paper
Refuting the dream XOR lemma via ideal obfuscation and resettable MPC
 
2024-06-25Paper
Doubly efficient private information retrieval and fully homomorphic RAM computation from ring LWE
 
2024-05-08Paper
Boosting batch arguments and RAM delegation
 
2024-05-08Paper
scientific article; zbMATH DE number 7829288 (Why is no real title available?)
 
2024-04-09Paper
The pseudorandom oracle model and ideal obfuscation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Universal amplification of KDM security: from 1-key circular to multi-key KDM
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Speak much, remember little: cryptography in the bounded storage model, revisited
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
A map of witness maps: new definitions and connections
Lecture Notes in Computer Science
2023-11-16Paper
Witness encryption and null-iO from evasive LWE
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Post-quantum insecurity from LWE
Theory of Cryptography
2023-08-14Paper
Nearly optimal property preserving hashing
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Adaptively secure MPC with sublinear communication complexity
Journal of Cryptology
2023-04-13Paper
Updatable public key encryption in the standard model
 
2023-04-13Paper
Succinct LWE sampling, random polynomials, and obfuscation
 
2023-04-13Paper
Leakage-resilient key exchange and two-seed extractors
 
2022-11-09Paper
Incompressible encodings
 
2022-11-09Paper
Witness maps and applications
Lecture Notes in Computer Science
2022-10-13Paper
Incompressible cryptography
 
2022-08-30Paper
Authentication in the bounded storage model
 
2022-08-30Paper
Targeted lossy functions and applications
 
2022-05-18Paper
Limits on the adaptive security of Yao's garbling
 
2022-04-22Paper
Two-round oblivious transfer from CDH or LPN
 
2022-03-23Paper
Candidate obfuscation via oblivious LWE sampling
 
2021-12-08Paper
Extracting randomness from extractor-dependent sources
 
2021-12-01Paper
Statistical ZAPR arguments from bilinear maps
 
2021-12-01Paper
Optimal broadcast encryption from LWE and pairings in the standard model
 
2021-12-01Paper
Is there an oblivious RAM lower bound for online reads?
Journal of Cryptology
2021-07-02Paper
Non-malleable codes for decision trees
 
2020-05-20Paper
On the plausibility of fully homomorphic encryption for RAMs
 
2020-05-20Paper
From cryptomania to obfustopia through secret-key functional encryption
Journal of Cryptology
2020-04-28Paper
Adaptively secure MPC with sublinear communication complexity
Advances in Cryptology – CRYPTO 2019
2020-03-09Paper
New constructions of reusable designated-verifier NIZKs
 
2020-03-09Paper
Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions
 
2020-03-09Paper
Private anonymous data access
 
2020-02-06Paper
Reusable designated-verifier NIZKs for all NP from CDH
 
2020-02-06Paper
Worst-case hardness for LPN and cryptographic hashing via code smoothing
 
2020-02-04Paper
Fiat-Shamir: from practice to theory
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Succinct delegation for low-space non-deterministic computation
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
Non-malleable codes
Journal of the ACM
2018-12-06Paper
Traitor-tracing from LWE made simple and attribute-based
 
2018-12-06Paper
Watermarking PRFs under standard assumptions: public marking and security with extraction queries
 
2018-12-06Paper
Is there an oblivious RAM lower bound for online reads?
Theory of Cryptography
2018-12-06Paper
Watermarking cryptographic capabilities
SIAM Journal on Computing
2018-12-05Paper
Non-trivial witness encryption and null-iO from standard assumptions
 
2018-10-17Paper
Hardness of non-interactive differential privacy from one-way functions
 
2018-09-12Paper
Multi-key searchable encryption, revisited
 
2018-05-16Paper
Adaptively indistinguishable garbled circuits
 
2018-01-19Paper
The edited truth
 
2018-01-19Paper
How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs
Algorithmica
2018-01-05Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
Algorithmica
2018-01-05Paper
Be adaptive, avoid overcommitting
 
2017-11-03Paper
Watermarking cryptographic capabilities
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
On the communication complexity of secure function evaluation with long output
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
2017-05-19Paper
Barriers in cryptography with weak, correlated and leaky sources
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits
IEEE Transactions on Information Theory
2017-04-28Paper
Dynamic proofs of retrievability via oblivious RAM
Journal of Cryptology
2017-03-02Paper
Standard security does not imply indistinguishability under selective opening
Theory of Cryptography
2016-12-22Paper
From cryptomania to obfustopia through secret-key functional encryption
Theory of Cryptography
2016-12-22Paper
Adaptive security of Yao's garbled circuits
Theory of Cryptography
2016-12-21Paper
Adaptively secure garbled circuits from one-way functions
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Spooky Encryption and Its Applications
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
A counterexample to the chain rule for conditional HILL entropy
Computational Complexity
2016-10-28Paper
Leakage-resilient cryptography from minimal assumptions
Journal of Cryptology
2016-09-21Paper
Essentially Optimal Robust Secret Sharing with Maximal Corruptions
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Two round multiparty computation via multi-key FHE
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Anonymous traitor tracing: how to embed arbitrary information in a key
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
New realizations of somewhere statistically binding hashing and positional accumulators
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Obfuscating conjunctions under entropic ring LWE
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Onion ORAM: a constant bandwidth blowup oblivious RAM
Theory of Cryptography
2016-04-08Paper
Perfect structure on the edge of chaos. Trapdoor permutations from indistinguishability obfuscation
Theory of Cryptography
2016-03-23Paper
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Lecture Notes in Computer Science
2015-08-27Paper
Leveled fully homomorphic signatures from standard lattices
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Tamper detection and continuous non-malleable codes
Theory of Cryptography
2015-07-06Paper
Non-malleable extractors and symmetric key cryptography from weak secrets
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
Optimizing ORAM and Using It Efficiently for Secure Computation
Privacy Enhancing Technologies
2014-08-19Paper
How to eat your entropy and have it too -- optimal recovery strategies for compromised RNGs
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Separating succinct non-interactive arguments from all falsifiable assumptions
Proceedings of the forty-third annual ACM symposium on Theory of computing
2014-06-05Paper
Efficient non-malleable codes and key-derivation for poly-size tampering circuits
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Garbled RAM revisited
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Key derivation without entropy waste
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
On continual leakage of discrete log representations
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Fully homomorphic message authenticators
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Learning with rounding, revisited. New reduction, properties and applications
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Fully leakage-resilient signatures
Journal of Cryptology
2013-08-01Paper
Leakage-resilient cryptography from minimal assumptions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Dynamic proofs of retrievability via oblivious RAM
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Why ``Fiat-Shamir for proofs lacks a proof
Theory of Cryptography
2013-03-18Paper
Multiparty computation with low communication, computation and interaction via threshold FHE
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Message authentication, revisited
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Counterexamples to hardness amplification beyond negligible
Theory of Cryptography
2012-06-15Paper
Key-evolution schemes resilient to space-bounded leakage
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Fully Leakage-Resilient Signatures
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
One-time computable self-erasing functions
Theory of Cryptography
2011-05-19Paper
Efficient public-key cryptography in the presence of key leakage
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Survey: leakage resilience and the bounded retrieval model
Lecture Notes in Computer Science
2010-09-29Paper
Public-key encryption in the bounded-retrieval model
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
On symmetric encryption and point obfuscation
Theory of Cryptography
2010-02-24Paper
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Proofs of Retrievability via Hardness Amplification
Theory of Cryptography
2009-03-03Paper
Universally Composable Multiparty Computation with Partially Isolated Parties
Theory of Cryptography
2009-03-03Paper
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Isolated Proofs of Knowledge and Isolated Zero Knowledge
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper


Research outcomes over time


This page was built for person: Daniel Wichs