Jonathan Katz

From MaRDI portal
Person:1429028

Available identifiers

zbMath Open katz.jonathan-nDBLPk/JonathanKatzWikidataQ16730637 ScholiaQ16730637MaRDI QIDQ1429028

List of research outcomes





PublicationDate of PublicationType
Latke: a framework for constructing identity-binding PAKEs2024-12-04Paper
State machine replication under changing network conditions2023-08-25Paper
An analysis of the algebraic group model2023-08-21Paper
Subset predicate encryption and its applications2023-08-02Paper
Boosting the Security of Blind Signature Schemes2023-05-26Paper
Algebraic adversaries in the universal composability framework2023-05-12Paper
\textsc{Tardigrade}: an atomic broadcast protocol for arbitrary network conditions2023-05-12Paper
Efficient 3-party distributed ORAM2022-12-16Paper
Universally composable relaxed password authenticated key exchange2022-11-09Paper
Spreading the privacy blanket: differentially oblivious shuffling for differential privacy2022-11-09Paper
Efficient, Reusable Fuzzy Extractors from LWE2022-06-15Paper
On the security of time-lock puzzles and timed commitments2022-03-23Paper
Asynchronous Byzantine agreement with subquadratic communication2021-12-01Paper
Introduction to Modern Cryptography2020-11-16Paper
Optimizing authenticated garbling for faster secure two-party computation2020-06-30Paper
Synchronous consensus with optimal asynchronous fallback guarantees2020-04-30Paper
Feasibility and infeasibility of secure computation with malicious PUFs2020-04-28Paper
Constant-round group key exchange from the Ring-LWE assumption2020-02-25Paper
Covert security with public verifiability: faster, leaner, and simpler2020-02-04Paper
(Efficient) universally composable oblivious transfer using a minimal number of stateless tokens2019-06-20Paper
More is less: perfectly secure oblivious algorithms in the multi-server setting2019-01-23Paper
Simple and efficient two-server ORAM2019-01-23Paper
Provable security of (tweakable) block ciphers based on substitution-permutation networks2018-09-12Paper
Faster Secure Two-Party Computation in the Single-Execution Setting2017-06-23Paper
Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited2017-06-13Paper
Selective-Opening Security in the Presence of Randomness Failures2017-01-06Paper
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation2016-10-21Paper
10-Round Feistel is Indifferentiable from an Ideal Cipher2016-07-15Paper
How fair is your protocol? A utility-based approach to protocol optimality2016-03-23Paper
Hash Functions from Defective Ideal Ciphers2016-03-02Paper
Efficient and secure authenticated key exchange using weak passwords2015-12-07Paper
Adaptively secure broadcast, revisited2015-09-11Paper
Distributing the setup in universally composable multi-party computation2015-09-03Paper
Multi-Client Verifiable Computation with Stronger Security Guarantees2015-07-06Paper
Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds2015-07-06Paper
Reliable broadcast in radio networks2015-03-10Paper
https://portal.mardi4nfdi.de/entity/Q31916152014-10-06Paper
Complete characterization of security notions for probabilistic private-key encryption2014-09-26Paper
On the efficiency of local decoding procedures for error-correcting codes2014-09-26Paper
Feasibility and Infeasibility of Secure Computation with Malicious PUFs2014-08-07Paper
Amortizing Garbled Circuits2014-08-07Paper
Efficient Three-Party Computation from Cut-and-Choose2014-08-07Paper
Multi-input Functional Encryption2014-05-27Paper
Verifiable Oblivious Storage2014-03-25Paper
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens2014-02-18Paper
Complete Fairness in Secure Two-Party Computation2014-02-17Paper
Authenticated broadcast with a partially compromised public-key infrastructure2014-02-11Paper
One-round multi-party communication complexity of distinguishing sums2014-01-10Paper
Functional Encryption from (Small) Hardware Tokens2013-12-10Paper
Round-optimal password-based authenticated key exchange2013-11-15Paper
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose2013-09-17Paper
Predicate encryption supporting disjunctions, polynomial equations, and inner products2013-06-27Paper
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption2013-04-19Paper
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS2013-04-19Paper
Multi-Client Non-interactive Verifiable Computation2013-03-18Paper
Feasibility and Completeness of Cryptographic Tasks in the Quantum World2013-03-18Paper
Universally Composable Synchronous Computation2013-03-18Paper
Byzantine Agreement with a Rational Adversary2012-11-01Paper
Collusion-Preserving Computation2012-09-25Paper
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series2012-07-20Paper
Fair Computation with Rational Players2012-06-29Paper
On the Security of the “Free-XOR” Technique2012-06-15Paper
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces2012-06-08Paper
Partial fairness in secure two-party computation2012-05-23Paper
Which languages have 4-round zero-knowledge proofs?2012-05-23Paper
Two-server password-only authenticated key exchange2012-05-11Paper
Constant-Round Private Function Evaluation with Linear Complexity2011-12-02Paper
Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions2011-05-19Paper
Impossibility of Blind Signatures from One-Way Permutations2011-05-19Paper
Limits of Computational Differential Privacy in the Client/Server Setting2011-05-19Paper
Round-Optimal Password-Based Authenticated Key Exchange2011-05-19Paper
On Achieving the “Best of Both Worlds” in Secure Multiparty Computation2011-05-17Paper
A Group Signature Scheme from Lattice Assumptions2010-12-07Paper
Parallel and concurrent security of the HB and \(HB^{+}\) protocols2010-09-21Paper
Lower bounds on the efficiency of encryption and digital signature schemes2010-08-16Paper
Partial Fairness in Secure Two-Party Computation2010-06-01Paper
Secure Network Coding over the Integers2010-05-28Paper
Bounds on the efficiency of black-box commitment schemes2010-03-10Paper
Efficient Rational Secret Sharing in Standard Communication Networks2010-02-24Paper
On black-box constructions of predicate encryption from trapdoor permutations2009-12-15Paper
Signature schemes with bounded leakage resilience2009-12-15Paper
Smooth projective hashing and password-based authenticated key exchange from lattices2009-12-15Paper
Proofs of storage from homomorphic identification protocols2009-12-15Paper
Collusion-Free Multiparty Computation in the Mediated Model2009-10-20Paper
Improving the round complexity of VSS in point-to-point networks2009-07-15Paper
Ring signatures: Stronger definitions, and constructions without random oracles2009-06-30Paper
Reducing complexity assumptions for statistically-hiding commitment2009-06-30Paper
Handling expected polynomial-time strategies in simulation-based security proofs2009-06-08Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Signing a Linear Subspace: Signature Schemes for Network Coding2009-03-24Paper
On expected constant-round protocols for Byzantine agreement2009-03-11Paper
Universally-Composable Two-Party Computation in Two Rounds2009-03-10Paper
Complete Fairness in Multi-party Computation without an Honest Majority2009-03-03Paper
Digital Signatures2009-02-19Paper
https://portal.mardi4nfdi.de/entity/Q35495922009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35497262009-01-05Paper
Rational Secret Sharing, Revisited2008-11-27Paper
How to Encrypt with a Malicious Random Number Generator2008-09-18Paper
Improving the Round Complexity of VSS in Point-to-Point Networks2008-08-19Paper
Reducing Complexity Assumptions for Statistically-Hiding Commitment2008-05-06Paper
Universally Composable Password-Based Key Exchange2008-05-06Paper
Aggregate Message Authentication Codes2008-04-24Paper
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products2008-04-15Paper
Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise2008-03-07Paper
Bridging Game Theory and Cryptography: Recent Results and Future Directions2008-03-05Paper
Which Languages Have 4-Round Zero-Knowledge Proofs?2008-03-05Paper
Universally Composable Multi-party Computation with an Unreliable Common Reference String2008-03-05Paper
Efficient signature schemes with tight reductions to the Diffie-Hellman problems2007-12-06Paper
Round-Efficient Secure Computation in Point-to-Point Networks2007-11-29Paper
Universally Composable Multi-party Computation Using Tamper-Proof Hardware2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Chosen‐Ciphertext Security from Identity‐Based Encryption2007-10-22Paper
Introduction to modern cryptography.2007-10-11Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Two-Server Password-Only Authenticated Key Exchange2007-09-24Paper
Parallel and Concurrent Security of the HB and HB +  Protocols2007-09-24Paper
On Expected Constant-Round Protocols for Byzantine Agreement2007-09-04Paper
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions2007-08-30Paper
A forward-secure public-key encryption scheme2007-08-20Paper
Scalable protocols for authenticated group key exchange2007-05-24Paper
Theory of Cryptography2007-02-12Paper
Security in Communication Networks2006-10-10Paper
Characterization of security notions for probabilistic private-key encryption2006-08-14Paper
Automata, Languages and Programming2006-01-10Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Theory of Cryptography2005-12-07Paper
Theory of Cryptography2005-12-07Paper
Theory of Cryptography2005-12-07Paper
Bounds on the Efficiency of Generic Cryptographic Constructions2005-10-28Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Incremental Unforgeable Encryption2004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47372362004-08-11Paper
The mathematics and statistics of voting power2004-03-29Paper
https://portal.mardi4nfdi.de/entity/Q44348802003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44348772003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44185242003-08-10Paper
Poststratification Without Population Level Information on the Poststratifying Variable With Application to Political Polling2003-08-07Paper
Strong Key-Insulated Signature Schemes2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44142662003-07-24Paper
Threshold Cryptosystems Based on Factoring2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44084212003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q31496752002-09-30Paper
https://portal.mardi4nfdi.de/entity/Q45361982002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q27788422002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27788392002-03-21Paper

Research outcomes over time

This page was built for person: Jonathan Katz