Mark Zhandry

From MaRDI portal
Person:1627967

Available identifiers

zbMath Open zhandry.markMaRDI QIDQ1627967

List of research outcomes





PublicationDate of PublicationType
Adaptive security in SNARGs via iO and lossy functions2025-01-10Paper
Limits on the power of prime-order groups: separating Q-type from static assumptions2024-12-13Paper
Full quantum equivalence of group action DLog and CDH, and more2024-11-15Paper
The relationship between idealized models under computationally bounded adversaries2024-09-13Paper
Multi-instance randomness extraction and security against bounded-storage mass surveillance2024-08-02Paper
Commitments to quantum states2024-05-08Paper
Computational wiretap coding from indistinguishability obfuscation2024-02-06Paper
Tracing quantum state distinguishers via backtracking2024-02-06Paper
Security-preserving distributed samplers: how to generate any CRS in one round without random oracles2024-02-02Paper
Another round of breaking and making quantum money: how to not build it from lattices, and more2024-01-16Paper
A lower bound on the length of signatures based on group actions and generic isogenies2023-12-08Paper
Full quantum equivalence of group action DLog and CDH, and more2023-08-25Paper
Adaptive multiparty NIKE2023-08-14Paper
Collusion resistant copy-protection for watermarkable functionalities2023-08-14Paper
To label, or not to label (in generic groups)2023-06-30Paper
Augmented random oracles2023-06-30Paper
New constructions of collapsing hashes2023-06-30Paper
On the feasibility of unclonable encryption, and more2023-06-28Paper
Franchised quantum money2023-05-12Paper
Redeeming reset indifferentiability and applications to post-quantum security2023-05-12Paper
Disappearing cryptography in the bounded storage model2023-04-13Paper
https://portal.mardi4nfdi.de/entity/Q58757892023-02-03Paper
How to Construct Quantum Random Functions2022-12-08Paper
Indifferentiability for public key cryptosystems2022-11-09Paper
New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings2022-11-09Paper
Quantum algorithms for variants of average-case lattice problems via filtering2022-08-30Paper
Incompressible cryptography2022-08-30Paper
White box traitor tracing2022-05-18Paper
New approaches for quantum copy-protection2022-03-31Paper
Hidden cosets and applications to unclonable cryptography2022-03-31Paper
Schrödinger's pirate: how to trace a quantum decoder2022-03-23Paper
Classical vs quantum random oracles2021-12-08Paper
Towards non-interactive witness hiding2021-12-01Paper
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness2021-08-10Paper
Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions2021-04-07Paper
One-shot signatures and applications to hybrid quantum/classical authentication2021-01-19Paper
Multiparty non-interactive key exchange and more from isogenies on elliptic curves2020-06-24Paper
The distinction between fixed and random generators in group-based assumptions2020-03-09Paper
How to record quantum queries, and applications to quantum indifferentiability2020-03-09Paper
Revisiting post-quantum Fiat-Shamir2020-03-09Paper
New techniques for obfuscating conjunctions2020-02-04Paper
On finding quantum multi-collisions2020-02-04Paper
Quantum lightning never strikes the same state twice2020-02-04Paper
On ELFs, deterministic encryption, and correlated-input security2020-02-04Paper
The magic of ELFs2019-08-13Paper
Parameter-hiding order revealing encryption2018-12-20Paper
Impossibility of order-revealing encryption in idealized models2018-12-06Paper
The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks2018-12-06Paper
Return of GGH15: provable security against zeroizing attacks2018-12-06Paper
Cutting-edge cryptography through the lens of secret sharing2018-12-03Paper
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness2018-01-19Paper
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation2018-01-05Paper
New security notions and feasibility results for authentication of quantum data2017-11-15Paper
Breaking the sub-exponential barrier in obfustopia2017-06-23Paper
How to Generate and Use Universal Samplers2017-01-06Paper
Secure Obfuscation in a Weak Multilinear Map Model2016-12-22Paper
Strong hardness of privacy from weak traitor tracing2016-12-21Paper
The Magic of ELFs2016-11-30Paper
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH132016-10-27Paper
Post-zeroizing obfuscation: new mathematical tools, and the case of evasive circuits2016-07-15Paper
Anonymous traitor tracing: how to embed arbitrary information in a key2016-07-15Paper
Functional encryption without obfuscation2016-04-08Paper
How to avoid obfuscation using witness PRFs2016-04-08Paper
Cutting-edge cryptography through the lens of secret sharing2016-04-08Paper
Order-revealing encryption and the hardness of private learning2016-03-23Paper
https://portal.mardi4nfdi.de/entity/Q29505822015-10-09Paper
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation2015-09-30Paper
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation2014-08-07Paper
Low overhead broadcast encryption from multilinear maps2014-08-07Paper
Secure signatures and chosen ciphertext security in a quantum computing world2013-09-17Paper
Quantum-secure message authentication codes2013-05-31Paper
Secure identity-based encryption in the quantum random oracle model2012-09-25Paper
Random oracles in a quantum world2011-12-02Paper

Research outcomes over time

This page was built for person: Mark Zhandry