Mark Zhandry

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Quantum state group actions2026-02-04Paper
On one-shot signatures, quantum vs. classical binding, and obfuscating permutations2026-02-04Paper
Translating between the common Haar random state model and the unitary model2026-02-04Paper
How to model unitary oracles2026-02-04Paper
Hard quantum extrapolations in quantum cryptography2025-12-02Paper
Adaptive security in SNARGs via iO and lossy functions2025-01-10Paper
Limits on the power of prime-order groups: separating Q-type from static assumptions2024-12-13Paper
Full quantum equivalence of group action DLog and CDH, and more
Journal of Cryptology
2024-11-15Paper
The relationship between idealized models under computationally bounded adversaries2024-09-13Paper
Multi-instance randomness extraction and security against bounded-storage mass surveillance2024-08-02Paper
Commitments to quantum states2024-05-08Paper
Computational wiretap coding from indistinguishability obfuscation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Tracing quantum state distinguishers via backtracking
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Security-preserving distributed samplers: how to generate any CRS in one round without random oracles
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Another round of breaking and making quantum money: how to not build it from lattices, and more
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
A lower bound on the length of signatures based on group actions and generic isogenies
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Full quantum equivalence of group action DLog and CDH, and more
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Adaptive multiparty NIKE
Theory of Cryptography
2023-08-14Paper
Collusion resistant copy-protection for watermarkable functionalities
Theory of Cryptography
2023-08-14Paper
To label, or not to label (in generic groups)
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Augmented random oracles
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
New constructions of collapsing hashes
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
On the feasibility of unclonable encryption, and more
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Franchised quantum money
Lecture Notes in Computer Science
2023-05-12Paper
Redeeming reset indifferentiability and applications to post-quantum security
Lecture Notes in Computer Science
2023-05-12Paper
Disappearing cryptography in the bounded storage model2023-04-13Paper
scientific article; zbMATH DE number 7650430 (Why is no real title available?)2023-02-03Paper
How to Construct Quantum Random Functions
Journal of the ACM
2022-12-08Paper
Indifferentiability for public key cryptosystems2022-11-09Paper
New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings2022-11-09Paper
Quantum algorithms for variants of average-case lattice problems via filtering
(available as arXiv preprint)
2022-08-30Paper
Incompressible cryptography2022-08-30Paper
White box traitor tracing2022-05-18Paper
New approaches for quantum copy-protection
(available as arXiv preprint)
2022-03-31Paper
Hidden cosets and applications to unclonable cryptography
(available as arXiv preprint)
2022-03-31Paper
Schrödinger's pirate: how to trace a quantum decoder2022-03-23Paper
Classical vs quantum random oracles2021-12-08Paper
Towards non-interactive witness hiding2021-12-01Paper
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness
Journal of Cryptology
2021-08-10Paper
Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions
Journal of Cryptology
2021-04-07Paper
One-shot signatures and applications to hybrid quantum/classical authentication
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
2021-01-19Paper
Multiparty non-interactive key exchange and more from isogenies on elliptic curves
Journal of Mathematical Cryptology
2020-06-24Paper
The distinction between fixed and random generators in group-based assumptions2020-03-09Paper
How to record quantum queries, and applications to quantum indifferentiability2020-03-09Paper
Revisiting post-quantum Fiat-Shamir2020-03-09Paper
New techniques for obfuscating conjunctions2020-02-04Paper
On finding quantum multi-collisions
(available as arXiv preprint)
2020-02-04Paper
Quantum lightning never strikes the same state twice
(available as arXiv preprint)
2020-02-04Paper
On ELFs, deterministic encryption, and correlated-input security2020-02-04Paper
The magic of ELFs
Journal of Cryptology
2019-08-13Paper
Parameter-hiding order revealing encryption2018-12-20Paper
Impossibility of order-revealing encryption in idealized models2018-12-06Paper
The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks2018-12-06Paper
Return of GGH15: provable security against zeroizing attacks2018-12-06Paper
Cutting-edge cryptography through the lens of secret sharing
Information and Computation
2018-12-03Paper
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness
Theory of Cryptography
2018-01-19Paper
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
Algorithmica
2018-01-05Paper
New security notions and feasibility results for authentication of quantum data
(available as arXiv preprint)
2017-11-15Paper
Breaking the sub-exponential barrier in obfustopia
Lecture Notes in Computer Science
2017-06-23Paper
How to Generate and Use Universal Samplers
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Secure Obfuscation in a Weak Multilinear Map Model
Theory of Cryptography
2016-12-22Paper
Strong hardness of privacy from weak traitor tracing
Theory of Cryptography
2016-12-21Paper
The Magic of ELFs
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Post-zeroizing obfuscation: new mathematical tools, and the case of evasive circuits
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Anonymous traitor tracing: how to embed arbitrary information in a key
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Functional encryption without obfuscation
Theory of Cryptography
2016-04-08Paper
How to avoid obfuscation using witness PRFs
Theory of Cryptography
2016-04-08Paper
Cutting-edge cryptography through the lens of secret sharing
Theory of Cryptography
2016-04-08Paper
Order-revealing encryption and the hardness of private learning
Theory of Cryptography
2016-03-23Paper
scientific article; zbMATH DE number 6492475 (Why is no real title available?)2015-10-09Paper
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Low overhead broadcast encryption from multilinear maps
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Secure signatures and chosen ciphertext security in a quantum computing world
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Quantum-secure message authentication codes
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Secure identity-based encryption in the quantum random oracle model
Lecture Notes in Computer Science
2012-09-25Paper
Random oracles in a quantum world
Lecture Notes in Computer Science
2011-12-02Paper


Research outcomes over time


This page was built for person: Mark Zhandry