Ilan Komargodski

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Scalable agreement protocols with optimal optimistic efficiency2025-01-10Paper
The cost of statistical security in proofs for repeated squaring2024-11-22Paper
Distributed-prover interactive proofs2024-08-01Paper
3-party secure computation for RAMs: optimal and concretely efficient2024-08-01Paper
Optimal oblivious parallel RAM2024-07-19Paper
OptORAMa: Optimal oblivious RAM
Journal of the ACM
2024-07-04Paper
New bounds on the local leakage resilience of Shamir's secret sharing scheme
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Fully adaptive decentralized multi-authority \textsf{ABE}
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Optimal security for keyed hash functions: avoiding time-space tradeoffs for finding collisions
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Maliciously-secure MrNISC in the plain model
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Oblivious parallel tight compaction2023-11-02Paper
On time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashing
Computational Complexity
2023-10-31Paper
On time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashing
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Time-space tradeoffs for sponge hashing: attacks and limitations for short collisions
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
\(\log^\ast\)-round game-theoretically-fair leader election
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Maliciously secure massively parallel computation for all-but-one corruptions
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
SPARKs: Succinct Parallelizable Arguments of Knowledge
Journal of the ACM
2023-04-27Paper
Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
Journal of Cryptology
2023-04-13Paper
Oblivious RAM with worst-case logarithmic overhead
Journal of Cryptology
2023-04-13Paper
Non-malleable time-lock puzzles and applications2023-04-13Paper
One-Way Functions and (Im)perfect Obfuscation
SIAM Journal on Computing
2023-04-04Paper
scientific article; zbMATH DE number 7650404 (Why is no real title available?)2023-02-03Paper
Impossibility of strong KDM security with auxiliary input2022-12-16Paper
A lower bound for adaptively-secure collective coin-flipping protocols2022-07-21Paper
On the complexity of compressing obfuscation
Journal of Cryptology
2022-07-18Paper
A logarithmic lower bound for oblivious RAM (for all Parameters)2022-05-18Paper
Oblivious RAM with \textit{worst-case} logarithmic overhead2022-05-18Paper
Non-malleable codes for bounded parallel-time tampering2022-04-22Paper
Secure massively parallel computation for dishonest majority2022-03-23Paper
OptORAMa: optimal oblivious RAM2022-03-23Paper
Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}2021-12-08Paper
Multiparty reusable non-interactive secure computation from LWE2021-12-08Paper
Continuous verifiable delay functions2021-12-01Paper
SPARKs: succinct parallelizable arguments of knowledge2021-12-01Paper
A lower bound for adaptively-secure collective coin flipping protocols
Combinatorica
2021-09-22Paper
Threshold secret sharing requires a linear-size alphabet
Theory of Computing
2020-12-17Paper
On the complexity of compressing obfuscation
Lecture Notes in Computer Science
2020-06-30Paper
From minicrypt to obfustopia via private-key functional encryption
Journal of Cryptology
2020-04-28Paper
Non-uniformly sound certificates with applications to concurrent zero-knowledge2020-03-09Paper
White-box vs. black-box complexity of search problems: Ramsey and graph property testing
Journal of the ACM
2020-02-11Paper
Distributional collision resistance beyond one-way functions
(available as arXiv preprint)
2020-02-04Paper
Strong locally testable codes with relaxed local decoders
ACM Transactions on Computation Theory
2019-12-16Paper
Hardness-preserving reductions via cuckoo hashing
Journal of Cryptology
2019-06-20Paper
Cutting-edge cryptography through the lens of secret sharing
Information and Computation
2018-12-03Paper
Communication with contextual uncertainty
Computational Complexity
2018-11-07Paper
Non-trivial witness encryption and null-iO from standard assumptions2018-10-17Paper
Leakage resilient one-way functions: the auxiliary-input setting
Theoretical Computer Science
2018-09-27Paper
On distributional collision resistant hashing2018-09-26Paper
How to Share a Secret, Infinitely
IEEE Transactions on Information Theory
2018-09-14Paper
Compressing communication in distributed protocols
(available as arXiv preprint)
2018-08-24Paper
Communication with contextual uncertainty
Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms
2018-07-16Paper
Limits on low-degree pseudorandom generators (or: sum-of-squares meets program obfuscation)2018-07-09Paper
Another step towards realizing random oracles: non-malleable point obfuscation2018-07-09Paper
Collision resistant hashing for paranoids: dealing with multiple collisions2018-07-09Paper
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
Journal of Cryptology
2018-05-28Paper
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
Journal of Cryptology
2018-04-26Paper
Non-interactive multiparty computation without correlated randomness2018-02-23Paper
Strong locally testable codes with relaxed local decoders2018-01-24Paper
Evolving secret sharing: dynamic thresholds and robustness2018-01-19Paper
Be adaptive, avoid overcommitting2017-11-03Paper
Negation-Limited Formulas.2017-08-31Paper
From Minicrypt to Obfustopia via private-key functional encryption
Lecture Notes in Computer Science
2017-06-13Paper
Secret-sharing for NP
Journal of Cryptology
2017-05-22Paper
Improved average-case lower bounds for De Morgan formula size: matching worst-case lower bound
SIAM Journal on Computing
2017-02-15Paper
Negation-limited formulas
Theoretical Computer Science
2016-12-22Paper
How to Share a Secret, Infinitely
Theory of Cryptography
2016-12-22Paper
Threshold Secret Sharing Requires a Linear Size Alphabet
Theory of Cryptography
2016-12-22Paper
Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
Theory of Cryptography
2016-12-21Paper
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Cutting-edge cryptography through the lens of secret sharing
Theory of Cryptography
2016-04-08Paper
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
Theory of Cryptography
2015-07-06Paper
Secret-sharing for \(\mathbf {NP}\)
Lecture Notes in Computer Science
2015-01-06Paper
Average-case lower bounds for formula size
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Hardness preserving reductions via cuckoo hashing
Theory of Cryptography
2013-03-18Paper


Research outcomes over time


This page was built for person: Ilan Komargodski