Jonathan N. Katz

From MaRDI portal
Person:1429028

Available identifiers

zbMath Open katz.jonathan-nWikidataQ16730637 ScholiaQ16730637MaRDI QIDQ1429028

List of research outcomes

PublicationDate of PublicationType
State machine replication under changing network conditions2023-08-25Paper
An analysis of the algebraic group model2023-08-21Paper
Subset predicate encryption and its applications2023-08-02Paper
Boosting the Security of Blind Signature Schemes2023-05-26Paper
\textsc{Tardigrade}: an atomic broadcast protocol for arbitrary network conditions2023-05-12Paper
Algebraic adversaries in the universal composability framework2023-05-12Paper
Efficient 3-party distributed ORAM2022-12-16Paper
Universally composable relaxed password authenticated key exchange2022-11-09Paper
Spreading the privacy blanket: differentially oblivious shuffling for differential privacy2022-11-09Paper
Efficient, Reusable Fuzzy Extractors from LWE2022-06-15Paper
On the security of time-lock puzzles and timed commitments2022-03-23Paper
Asynchronous Byzantine agreement with subquadratic communication2021-12-01Paper
Introduction to Modern Cryptography2020-11-16Paper
Optimizing authenticated garbling for faster secure two-party computation2020-06-30Paper
Synchronous consensus with optimal asynchronous fallback guarantees2020-04-30Paper
Feasibility and infeasibility of secure computation with malicious PUFs2020-04-28Paper
Constant-round group key exchange from the Ring-LWE assumption2020-02-25Paper
Covert security with public verifiability: faster, leaner, and simpler2020-02-04Paper
(Efficient) universally composable oblivious transfer using a minimal number of stateless tokens2019-06-20Paper
Simple and efficient two-server ORAM2019-01-23Paper
More is less: perfectly secure oblivious algorithms in the multi-server setting2019-01-23Paper
Provable security of (tweakable) block ciphers based on substitution-permutation networks2018-09-12Paper
Faster Secure Two-Party Computation in the Single-Execution Setting2017-06-23Paper
Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited2017-06-13Paper
Selective-Opening Security in the Presence of Randomness Failures2017-01-06Paper
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation2016-10-21Paper
10-Round Feistel is Indifferentiable from an Ideal Cipher2016-07-15Paper
How Fair is Your Protocol?2016-03-23Paper
Hash Functions from Defective Ideal Ciphers2016-03-02Paper
Efficient and secure authenticated key exchange using weak passwords2015-12-07Paper
Adaptively secure broadcast, revisited2015-09-11Paper
Distributing the setup in universally composable multi-party computation2015-09-03Paper
Multi-Client Verifiable Computation with Stronger Security Guarantees2015-07-06Paper
Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds2015-07-06Paper
Reliable broadcast in radio networks2015-03-10Paper
https://portal.mardi4nfdi.de/entity/Q31916152014-10-06Paper
On the efficiency of local decoding procedures for error-correcting codes2014-09-26Paper
Complete characterization of security notions for probabilistic private-key encryption2014-09-26Paper
Feasibility and Infeasibility of Secure Computation with Malicious PUFs2014-08-07Paper
Amortizing Garbled Circuits2014-08-07Paper
Efficient Three-Party Computation from Cut-and-Choose2014-08-07Paper
Multi-input Functional Encryption2014-05-27Paper
Verifiable Oblivious Storage2014-03-25Paper
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens2014-02-18Paper
Complete Fairness in Secure Two-Party Computation2014-02-17Paper
Authenticated broadcast with a partially compromised public-key infrastructure2014-02-11Paper
One-round multi-party communication complexity of distinguishing sums2014-01-10Paper
Functional Encryption from (Small) Hardware Tokens2013-12-10Paper
Round-optimal password-based authenticated key exchange2013-11-15Paper
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose2013-09-17Paper
Predicate encryption supporting disjunctions, polynomial equations, and inner products2013-06-27Paper
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption2013-04-19Paper
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS2013-04-19Paper
Feasibility and Completeness of Cryptographic Tasks in the Quantum World2013-03-18Paper
Universally Composable Synchronous Computation2013-03-18Paper
Multi-Client Non-interactive Verifiable Computation2013-03-18Paper
Byzantine Agreement with a Rational Adversary2012-11-01Paper
Collusion-Preserving Computation2012-09-25Paper
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series2012-07-20Paper
Fair Computation with Rational Players2012-06-29Paper
On the Security of the “Free-XOR” Technique2012-06-15Paper
Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces2012-06-08Paper
Partial fairness in secure two-party computation2012-05-23Paper
Which languages have 4-round zero-knowledge proofs?2012-05-23Paper
Two-server password-only authenticated key exchange2012-05-11Paper
Constant-Round Private Function Evaluation with Linear Complexity2011-12-02Paper
Round-Optimal Password-Based Authenticated Key Exchange2011-05-19Paper
Limits of Computational Differential Privacy in the Client/Server Setting2011-05-19Paper
Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions2011-05-19Paper
Impossibility of Blind Signatures from One-Way Permutations2011-05-19Paper
On Achieving the “Best of Both Worlds” in Secure Multiparty Computation2011-05-17Paper
A Group Signature Scheme from Lattice Assumptions2010-12-07Paper
Lower bounds on the efficiency of encryption and digital signature schemes2010-08-16Paper
Partial Fairness in Secure Two-Party Computation2010-06-01Paper
Secure Network Coding over the Integers2010-05-28Paper
Bounds on the efficiency of black-box commitment schemes2010-03-10Paper
Efficient Rational Secret Sharing in Standard Communication Networks2010-02-24Paper
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations2009-12-15Paper
Proofs of Storage from Homomorphic Identification Protocols2009-12-15Paper
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices2009-12-15Paper
Signature Schemes with Bounded Leakage Resilience2009-12-15Paper
Collusion-Free Multiparty Computation in the Mediated Model2009-10-20Paper
Improving the round complexity of VSS in point-to-point networks2009-07-15Paper
Ring signatures: Stronger definitions, and constructions without random oracles2009-06-30Paper
Reducing complexity assumptions for statistically-hiding commitment2009-06-30Paper
Handling expected polynomial-time strategies in simulation-based security proofs2009-06-08Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Signing a Linear Subspace: Signature Schemes for Network Coding2009-03-24Paper
On expected constant-round protocols for Byzantine agreement2009-03-11Paper
Universally-Composable Two-Party Computation in Two Rounds2009-03-10Paper
Complete Fairness in Multi-party Computation without an Honest Majority2009-03-03Paper
Digital Signatures2009-02-19Paper
https://portal.mardi4nfdi.de/entity/Q35495922009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35497262009-01-05Paper
Rational Secret Sharing, Revisited2008-11-27Paper
How to Encrypt with a Malicious Random Number Generator2008-09-18Paper
Improving the Round Complexity of VSS in Point-to-Point Networks2008-08-19Paper
Reducing Complexity Assumptions for Statistically-Hiding Commitment2008-05-06Paper
Universally Composable Password-Based Key Exchange2008-05-06Paper
Aggregate Message Authentication Codes2008-04-24Paper
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products2008-04-15Paper
Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise2008-03-07Paper
Which Languages Have 4-Round Zero-Knowledge Proofs?2008-03-05Paper
Universally Composable Multi-party Computation with an Unreliable Common Reference String2008-03-05Paper
Bridging Game Theory and Cryptography: Recent Results and Future Directions2008-03-05Paper
Efficient signature schemes with tight reductions to the Diffie-Hellman problems2007-12-06Paper
Universally Composable Multi-party Computation Using Tamper-Proof Hardware2007-11-29Paper
Round-Efficient Secure Computation in Point-to-Point Networks2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Chosen‐Ciphertext Security from Identity‐Based Encryption2007-10-22Paper
https://portal.mardi4nfdi.de/entity/Q53103622007-10-11Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Parallel and Concurrent Security of the HB and HB +  Protocols2007-09-24Paper
Two-Server Password-Only Authenticated Key Exchange2007-09-24Paper
On Expected Constant-Round Protocols for Byzantine Agreement2007-09-04Paper
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions2007-08-30Paper
A forward-secure public-key encryption scheme2007-08-20Paper
Scalable protocols for authenticated group key exchange2007-05-24Paper
Theory of Cryptography2007-02-12Paper
Security in Communication Networks2006-10-10Paper
Characterization of security notions for probabilistic private-key encryption2006-08-14Paper
Automata, Languages and Programming2006-01-10Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Theory of Cryptography2005-12-07Paper
Theory of Cryptography2005-12-07Paper
Theory of Cryptography2005-12-07Paper
Bounds on the Efficiency of Generic Cryptographic Constructions2005-10-28Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Incremental Unforgeable Encryption2004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47372362004-08-11Paper
The mathematics and statistics of voting power2004-03-29Paper
https://portal.mardi4nfdi.de/entity/Q44348772003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44348802003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44185242003-08-10Paper
Poststratification Without Population Level Information on the Poststratifying Variable With Application to Political Polling2003-08-07Paper
Strong Key-Insulated Signature Schemes2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44142662003-07-24Paper
Threshold Cryptosystems Based on Factoring2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44084212003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q31496752002-09-30Paper
https://portal.mardi4nfdi.de/entity/Q45361982002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q27788422002-03-21Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Jonathan N. Katz