Omer Paneth

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Incrementally verifiable computation via rate-1 batch arguments2025-08-15Paper
On the cryptographic hardness of finding a Nash equilibrium2025-08-05Paper
From the impossibility of obfuscation to a new non-black-box simulation technique2025-05-05Paper
Reusable online-efficient commitments2024-12-13Paper
Public-coin, complexity-preserving, succinct arguments of knowledge for NP from collision-resistance2024-11-13Paper
Monotone-policy aggregate signatures2024-11-13Paper
Non-interactive universal arguments
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
SNARGs for monotone policy batch NP
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Verifiable private information retrieval
Theory of Cryptography
2023-08-14Paper
PPAD is as hard as LWE and iterated squaring
Theory of Cryptography
2023-08-14Paper
Delegation with updatable unambiguous proofs and PPAD-hardness2022-12-07Paper
Succinct non-interactive arguments via linear interactive proofs
Journal of Cryptology
2022-05-10Paper
Weak Zero-Knowledge beyond the Black-Box Barrier
SIAM Journal on Computing
2022-02-08Paper
Weakly extractable one-way functions2021-12-01Paper
Incrementally verifiable computation via incremental PCPs2020-04-30Paper
On round optimal statistical zero knowledge arguments2020-03-09Paper
How to delegate computations publicly
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Weak zero-knowledge beyond the black-box barrier
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Multi-collision resistance: a paradigm for keyless hash functions
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
On zero-testable homomorphic encryption and publicly verifiable non-interactive arguments2018-01-19Paper
On virtual grey box obfuscation for general circuits
Algorithmica
2018-01-05Paper
On Removing Graded Encodings from Functional Encryption
Lecture Notes in Computer Science
2017-06-13Paper
Delegating RAM Computations
Theory of Cryptography
2016-12-22Paper
3-message zero knowledge against human ignorance
Theory of Cryptography
2016-12-21Paper
On the existence of extractable one-way functions
SIAM Journal on Computing
2016-10-28Paper
Reusable fuzzy extractors for low-entropy distributions
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Time-lock puzzles from randomized encodings
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Perfect structure on the edge of chaos. Trapdoor permutations from indistinguishability obfuscation
Theory of Cryptography
2016-03-23Paper
On non-black-box simulation and the impossibility of approximate obfuscation
SIAM Journal on Computing
2015-11-04Paper
On obfuscation with random oracles
Theory of Cryptography
2015-07-06Paper
ZAPs and non-interactive witness indistinguishability from indistinguishability obfuscation
Theory of Cryptography
2015-07-06Paper
On the existence of extractable one-way functions
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
On virtual grey box obfuscation for general circuits
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On the impossibility of approximate obfuscation and applications to resettable cryptography
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
The impossibility of obfuscation with auxiliary input or a universal simulator
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Client-server concurrent zero knowledge with constant rounds and guaranteed complexity
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Protecting obfuscation against algebraic attacks
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Verifiable set operations over outsourced databases
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Obfuscation for evasive functions
Theory of Cryptography
2014-02-18Paper
On the achievability of simulation-based security for functional encryption
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Succinct non-interactive arguments via linear interactive proofs
Theory of Cryptography
2013-03-18Paper
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model
Theory of Cryptography
2013-03-18Paper
Point obfuscation and 3-round zero-knowledge
Theory of Cryptography
2012-06-15Paper


Research outcomes over time


This page was built for person: Omer Paneth