Mark Zhandry

From MaRDI portal
Person:1627967

Available identifiers

zbMath Open zhandry.markMaRDI QIDQ1627967

List of research outcomes

PublicationDate of PublicationType
Computational wiretap coding from indistinguishability obfuscation2024-02-06Paper
Tracing quantum state distinguishers via backtracking2024-02-06Paper
Security-preserving distributed samplers: how to generate any CRS in one round without random oracles2024-02-02Paper
Another round of breaking and making quantum money: how to not build it from lattices, and more2024-01-16Paper
A lower bound on the length of signatures based on group actions and generic isogenies2023-12-08Paper
Full quantum equivalence of group action DLog and CDH, and more2023-08-25Paper
Collusion resistant copy-protection for watermarkable functionalities2023-08-14Paper
Adaptive multiparty NIKE2023-08-14Paper
Augmented random oracles2023-06-30Paper
To label, or not to label (in generic groups)2023-06-30Paper
New constructions of collapsing hashes2023-06-30Paper
On the feasibility of unclonable encryption, and more2023-06-28Paper
Redeeming reset indifferentiability and applications to post-quantum security2023-05-12Paper
Franchised quantum money2023-05-12Paper
Disappearing cryptography in the bounded storage model2023-04-13Paper
https://portal.mardi4nfdi.de/entity/Q58757892023-02-03Paper
How to Construct Quantum Random Functions2022-12-08Paper
Indifferentiability for public key cryptosystems2022-11-09Paper
New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings2022-11-09Paper
Incompressible cryptography2022-08-30Paper
Quantum algorithms for variants of average-case lattice problems via filtering2022-08-30Paper
White box traitor tracing2022-05-18Paper
New approaches for quantum copy-protection2022-03-31Paper
Hidden cosets and applications to unclonable cryptography2022-03-31Paper
Schrödinger's pirate: how to trace a quantum decoder2022-03-23Paper
Classical vs quantum random oracles2021-12-08Paper
Towards non-interactive witness hiding2021-12-01Paper
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness2021-08-10Paper
Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions2021-04-07Paper
One-shot signatures and applications to hybrid quantum/classical authentication2021-01-19Paper
Multiparty non-interactive key exchange and more from isogenies on elliptic curves2020-06-24Paper
How to record quantum queries, and applications to quantum indifferentiability2020-03-09Paper
Revisiting post-quantum Fiat-Shamir2020-03-09Paper
The distinction between fixed and random generators in group-based assumptions2020-03-09Paper
On ELFs, deterministic encryption, and correlated-input security2020-02-04Paper
On finding quantum multi-collisions2020-02-04Paper
Quantum lightning never strikes the same state twice2020-02-04Paper
New techniques for obfuscating conjunctions2020-02-04Paper
The magic of ELFs2019-08-13Paper
Parameter-hiding order revealing encryption2018-12-20Paper
Impossibility of order-revealing encryption in idealized models2018-12-06Paper
The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks2018-12-06Paper
Return of GGH15: provable security against zeroizing attacks2018-12-06Paper
Cutting-edge cryptography through the lens of secret sharing2018-12-03Paper
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness2018-01-19Paper
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation2018-01-05Paper
New security notions and feasibility results for authentication of quantum data2017-11-15Paper
Breaking the Sub-Exponential Barrier in Obfustopia2017-06-23Paper
How to Generate and Use Universal Samplers2017-01-06Paper
Secure Obfuscation in a Weak Multilinear Map Model2016-12-22Paper
Strong Hardness of Privacy from Weak Traitor Tracing2016-12-21Paper
The Magic of ELFs2016-11-30Paper
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH132016-10-27Paper
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key2016-07-15Paper
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits2016-07-15Paper
How to Avoid Obfuscation Using Witness PRFs2016-04-08Paper
Cutting-Edge Cryptography Through the Lens of Secret Sharing2016-04-08Paper
Functional Encryption Without Obfuscation2016-04-08Paper
Order-Revealing Encryption and the Hardness of Private Learning2016-03-23Paper
https://portal.mardi4nfdi.de/entity/Q29505822015-10-09Paper
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation2015-09-30Paper
Low Overhead Broadcast Encryption from Multilinear Maps2014-08-07Paper
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation2014-08-07Paper
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World2013-09-17Paper
Quantum-Secure Message Authentication Codes2013-05-31Paper
Secure Identity-Based Encryption in the Quantum Random Oracle Model2012-09-25Paper
Random Oracles in a Quantum World2011-12-02Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Mark Zhandry