Jonathan Katz

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Rational protocol design: cryptography against incentive-driven adversaries2025-05-20Paper
Coupled-worlds privacy: exploiting adversarial uncertainty in statistical data privacy2025-05-20Paper
Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage2025-04-29Paper
Latke: a framework for constructing identity-binding PAKEs2024-12-04Paper
State machine replication under changing network conditions
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
An analysis of the algebraic group model
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Subset predicate encryption and its applications
Cryptology and Network Security
2023-08-02Paper
Boosting the Security of Blind Signature Schemes
Lecture Notes in Computer Science
2023-05-26Paper
Algebraic adversaries in the universal composability framework
Lecture Notes in Computer Science
2023-05-12Paper
\textsc{Tardigrade}: an atomic broadcast protocol for arbitrary network conditions
Lecture Notes in Computer Science
2023-05-12Paper
Efficient 3-party distributed ORAM2022-12-16Paper
Universally composable relaxed password authenticated key exchange2022-11-09Paper
Spreading the privacy blanket: differentially oblivious shuffling for differential privacy2022-11-09Paper
Efficient, reusable fuzzy extractors from LWE
Lecture Notes in Computer Science
2022-06-15Paper
On the security of time-lock puzzles and timed commitments2022-03-23Paper
Asynchronous Byzantine agreement with subquadratic communication2021-12-01Paper
Introduction to Modern Cryptography2020-11-16Paper
Optimizing authenticated garbling for faster secure two-party computation2020-06-30Paper
Synchronous consensus with optimal asynchronous fallback guarantees2020-04-30Paper
Feasibility and infeasibility of secure computation with malicious PUFs
Journal of Cryptology
2020-04-28Paper
Constant-round group key exchange from the ring-LWE assumption2020-02-25Paper
Covert security with public verifiability: faster, leaner, and simpler2020-02-04Paper
(Efficient) universally composable oblivious transfer using a minimal number of stateless tokens
Journal of Cryptology
2019-06-20Paper
More is less: perfectly secure oblivious algorithms in the multi-server setting
(available as arXiv preprint)
2019-01-23Paper
Simple and efficient two-server ORAM2019-01-23Paper
Provable security of (tweakable) block ciphers based on substitution-permutation networks2018-09-12Paper
Faster secure two-party computation in the single-execution setting
Lecture Notes in Computer Science
2017-06-23Paper
Fixing cracks in the concrete: random oracles with auxiliary input, revisited
Lecture Notes in Computer Science
2017-06-13Paper
Selective-Opening Security in the Presence of Randomness Failures
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
A unified approach to idealized model separations via indistinguishability obfuscation
Lecture Notes in Computer Science
2016-10-21Paper
10-round Feistel is indifferentiable from an ideal cipher
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
How fair is your protocol? A utility-based approach to protocol optimality
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing
2016-03-23Paper
Hash functions from defective ideal ciphers
Lecture Notes in Computer Science
2016-03-02Paper
Efficient and secure authenticated key exchange using weak passwords
Journal of the ACM
2015-12-07Paper
Adaptively secure broadcast, revisited
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
2015-09-11Paper
Distributing the setup in universally composable multi-party computation
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
Adaptively secure, universally composable, multiparty computation in constant rounds
Theory of Cryptography
2015-07-06Paper
Multi-client verifiable computation with stronger security guarantees
Theory of Cryptography
2015-07-06Paper
Reliable broadcast in radio networks
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
2015-03-10Paper
Introduction to modern cryptography2014-10-06Paper
Complete characterization of security notions for probabilistic private-key encryption
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
On the efficiency of local decoding procedures for error-correcting codes
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
Amortizing Garbled Circuits
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Efficient three-party computation from cut-and-choose
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Feasibility and infeasibility of secure computation with malicious PUFs
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Multi-input functional encryption
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Verifiable oblivious storage
Public-Key Cryptography – PKC 2014
2014-03-25Paper
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
Theory of Cryptography
2014-02-18Paper
Complete fairness in secure two-party computation
Journal of the ACM
2014-02-17Paper
Authenticated broadcast with a partially compromised public-key infrastructure
Information and Computation
2014-02-11Paper
One-round multi-party communication complexity of distinguishing sums
Theoretical Computer Science
2014-01-10Paper
Functional encryption from (small) hardware tokens
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Round-optimal password-based authenticated key exchange
Journal of Cryptology
2013-11-15Paper
Efficient secure two-party computation using symmetric cut-and-choose
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Predicate encryption supporting disjunctions, polynomial equations, and inner products
Journal of Cryptology
2013-06-27Paper
Feasibility and infeasibility of adaptively secure fully homomorphic encryption
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Feasibility and completeness of cryptographic tasks in the quantum world
Theory of Cryptography
2013-03-18Paper
Universally composable synchronous computation
Theory of Cryptography
2013-03-18Paper
Multi-client non-interactive verifiable computation
Theory of Cryptography
2013-03-18Paper
Byzantine agreement with a rational adversary
Automata, Languages, and Programming
2012-11-01Paper
Collusion-preserving computation
Lecture Notes in Computer Science
2012-09-25Paper
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
Public Key Cryptography – PKC 2012
2012-07-20Paper
Fair computation with rational players
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
On the security of the ``Free-XOR'' technique
Theory of Cryptography
2012-06-15Paper
Secure multi-party computation of Boolean circuits with applications to privacy in on-line marketplaces
Lecture Notes in Computer Science
2012-06-08Paper
Partial fairness in secure two-party computation
Journal of Cryptology
2012-05-23Paper
Which languages have 4-round zero-knowledge proofs?
Journal of Cryptology
2012-05-23Paper
Two-server password-only authenticated key exchange
Journal of Computer and System Sciences
2012-05-11Paper
Constant-round private function evaluation with linear complexity
Lecture Notes in Computer Science
2011-12-02Paper
Limits of computational differential privacy in the client/server setting
Theory of Cryptography
2011-05-19Paper
Round-optimal password-based authenticated key exchange
Theory of Cryptography
2011-05-19Paper
Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions
Theory of Cryptography
2011-05-19Paper
Impossibility of blind signatures from one-way permutations
Theory of Cryptography
2011-05-19Paper
On achieving the ``best of both worlds'' in secure multiparty computation
SIAM Journal on Computing
2011-05-17Paper
A Group Signature Scheme from Lattice Assumptions
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Parallel and concurrent security of the HB and \(HB^{+}\) protocols
Journal of Cryptology
2010-09-21Paper
Lower bounds on the efficiency of encryption and digital signature schemes
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
2010-08-16Paper
Partial fairness in secure two-party computation
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Secure network coding over the integers
Public Key Cryptography – PKC 2010
2010-05-28Paper
Bounds on the efficiency of black-box commitment schemes
Theoretical Computer Science
2010-03-10Paper
Efficient rational secret sharing in standard communication networks
Theory of Cryptography
2010-02-24Paper
Signature schemes with bounded leakage resilience
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Smooth projective hashing and password-based authenticated key exchange from lattices
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Proofs of storage from homomorphic identification protocols
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
On black-box constructions of predicate encryption from trapdoor permutations
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Collusion-Free Multiparty Computation in the Mediated Model
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Improving the round complexity of VSS in point-to-point networks
Information and Computation
2009-07-15Paper
Ring signatures: Stronger definitions, and constructions without random oracles
Journal of Cryptology
2009-06-30Paper
Reducing complexity assumptions for statistically-hiding commitment
Journal of Cryptology
2009-06-30Paper
Handling expected polynomial-time strategies in simulation-based security proofs
Journal of Cryptology
2009-06-08Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Signing a Linear Subspace: Signature Schemes for Network Coding
Public Key Cryptography – PKC 2009
2009-03-24Paper
On expected constant-round protocols for Byzantine agreement
Journal of Computer and System Sciences
2009-03-11Paper
Universally-Composable Two-Party Computation in Two Rounds
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Complete Fairness in Multi-party Computation without an Honest Majority
Theory of Cryptography
2009-03-03Paper
Digital Signatures2009-02-19Paper
scientific article; zbMATH DE number 5485432 (Why is no real title available?)2009-01-05Paper
Complete fairness in secure two-party computation2009-01-05Paper
Rational Secret Sharing, Revisited
Lecture Notes in Computer Science
2008-11-27Paper
How to Encrypt with a Malicious Random Number Generator
Fast Software Encryption
2008-09-18Paper
Improving the Round Complexity of VSS in Point-to-Point Networks
Automata, Languages and Programming
2008-08-19Paper
Reducing Complexity Assumptions for Statistically-Hiding Commitment
Lecture Notes in Computer Science
2008-05-06Paper
Universally Composable Password-Based Key Exchange
Lecture Notes in Computer Science
2008-05-06Paper
Aggregate Message Authentication Codes
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise
Cryptography and Coding
2008-03-07Paper
Bridging Game Theory and Cryptography: Recent Results and Future Directions
Theory of Cryptography
2008-03-05Paper
Which Languages Have 4-Round Zero-Knowledge Proofs?
Theory of Cryptography
2008-03-05Paper
Universally Composable Multi-party Computation with an Unreliable Common Reference String
Theory of Cryptography
2008-03-05Paper
Efficient signature schemes with tight reductions to the Diffie-Hellman problems
Journal of Cryptology
2007-12-06Paper
Round-Efficient Secure Computation in Point-to-Point Networks
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Chosen‐Ciphertext Security from Identity‐Based Encryption
SIAM Journal on Computing
2007-10-22Paper
Introduction to modern cryptography.2007-10-11Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Two-Server Password-Only Authenticated Key Exchange
Applied Cryptography and Network Security
2007-09-24Paper
Parallel and Concurrent Security of the HB and HB +  Protocols
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
On Expected Constant-Round Protocols for Byzantine Agreement
Lecture Notes in Computer Science
2007-09-04Paper
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
Theory of Cryptography
2007-08-30Paper
A forward-secure public-key encryption scheme
Journal of Cryptology
2007-08-20Paper
Scalable protocols for authenticated group key exchange
Journal of Cryptology
2007-05-24Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Characterization of security notions for probabilistic private-key encryption
Journal of Cryptology
2006-08-14Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Bounds on the Efficiency of Generic Cryptographic Constructions
SIAM Journal on Computing
2005-10-28Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Incremental Unforgeable Encryption
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2086699 (Why is no real title available?)2004-08-11Paper
The mathematics and statistics of voting power
Statistical Science
2004-03-29Paper
scientific article; zbMATH DE number 2009960 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 2009957 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1962140 (Why is no real title available?)2003-08-10Paper
Poststratification Without Population Level Information on the Poststratifying Variable With Application to Political Polling
Journal of the American Statistical Association
2003-08-07Paper
Strong Key-Insulated Signature Schemes
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1952887 (Why is no real title available?)2003-07-24Paper
Threshold Cryptosystems Based on Factoring
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1941231 (Why is no real title available?)2003-06-29Paper
scientific article; zbMATH DE number 1808213 (Why is no real title available?)2002-09-30Paper
scientific article; zbMATH DE number 1759277 (Why is no real title available?)2002-06-25Paper
scientific article; zbMATH DE number 1722670 (Why is no real title available?)2002-03-21Paper
scientific article; zbMATH DE number 1722672 (Why is no real title available?)2002-03-21Paper


Research outcomes over time


This page was built for person: Jonathan Katz