Mark Zhandry

From MaRDI portal
(Redirected from Person:1627967)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Quantum state group actions2026-02-04Paper
On one-shot signatures, quantum vs. classical binding, and obfuscating permutations2026-02-04Paper
Translating between the common Haar random state model and the unitary model2026-02-04Paper
How to model unitary oracles2026-02-04Paper
Hard quantum extrapolations in quantum cryptography2025-12-02Paper
Adaptive security in SNARGs via iO and lossy functions2025-01-10Paper
Limits on the power of prime-order groups: separating Q-type from static assumptions2024-12-13Paper
Full quantum equivalence of group action DLog and CDH, and more
Journal of Cryptology
2024-11-15Paper
The relationship between idealized models under computationally bounded adversaries2024-09-13Paper
Multi-instance randomness extraction and security against bounded-storage mass surveillance2024-08-02Paper
Commitments to quantum states2024-05-08Paper
Computational wiretap coding from indistinguishability obfuscation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Tracing quantum state distinguishers via backtracking
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Security-preserving distributed samplers: how to generate any CRS in one round without random oracles
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Another round of breaking and making quantum money: how to not build it from lattices, and more
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
A lower bound on the length of signatures based on group actions and generic isogenies
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Full quantum equivalence of group action DLog and CDH, and more
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Adaptive multiparty NIKE
Theory of Cryptography
2023-08-14Paper
Collusion resistant copy-protection for watermarkable functionalities
Theory of Cryptography
2023-08-14Paper
To label, or not to label (in generic groups)
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Augmented random oracles
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
New constructions of collapsing hashes
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
On the feasibility of unclonable encryption, and more
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Franchised quantum money
Lecture Notes in Computer Science
2023-05-12Paper
Redeeming reset indifferentiability and applications to post-quantum security
Lecture Notes in Computer Science
2023-05-12Paper
Disappearing cryptography in the bounded storage model2023-04-13Paper
scientific article; zbMATH DE number 7650430 (Why is no real title available?)2023-02-03Paper
How to Construct Quantum Random Functions
Journal of the ACM
2022-12-08Paper
Indifferentiability for public key cryptosystems2022-11-09Paper
New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings2022-11-09Paper
Quantum algorithms for variants of average-case lattice problems via filtering
(available as arXiv preprint)
2022-08-30Paper
Incompressible cryptography2022-08-30Paper
White box traitor tracing2022-05-18Paper
New approaches for quantum copy-protection
(available as arXiv preprint)
2022-03-31Paper
Hidden cosets and applications to unclonable cryptography
(available as arXiv preprint)
2022-03-31Paper
Schrödinger's pirate: how to trace a quantum decoder2022-03-23Paper
Classical vs quantum random oracles2021-12-08Paper
Towards non-interactive witness hiding2021-12-01Paper
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness
Journal of Cryptology
2021-08-10Paper
Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions
Journal of Cryptology
2021-04-07Paper
One-shot signatures and applications to hybrid quantum/classical authentication
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
2021-01-19Paper
Multiparty non-interactive key exchange and more from isogenies on elliptic curves
Journal of Mathematical Cryptology
2020-06-24Paper
The distinction between fixed and random generators in group-based assumptions2020-03-09Paper
How to record quantum queries, and applications to quantum indifferentiability2020-03-09Paper
Revisiting post-quantum Fiat-Shamir2020-03-09Paper
New techniques for obfuscating conjunctions2020-02-04Paper
On finding quantum multi-collisions
(available as arXiv preprint)
2020-02-04Paper
Quantum lightning never strikes the same state twice
(available as arXiv preprint)
2020-02-04Paper
On ELFs, deterministic encryption, and correlated-input security2020-02-04Paper
The magic of ELFs
Journal of Cryptology
2019-08-13Paper
Parameter-hiding order revealing encryption2018-12-20Paper
Impossibility of order-revealing encryption in idealized models2018-12-06Paper
The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks2018-12-06Paper
Return of GGH15: provable security against zeroizing attacks2018-12-06Paper
Cutting-edge cryptography through the lens of secret sharing
Information and Computation
2018-12-03Paper
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness
Theory of Cryptography
2018-01-19Paper
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
Algorithmica
2018-01-05Paper
New security notions and feasibility results for authentication of quantum data
(available as arXiv preprint)
2017-11-15Paper
Breaking the sub-exponential barrier in obfustopia
Lecture Notes in Computer Science
2017-06-23Paper
How to Generate and Use Universal Samplers
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Secure Obfuscation in a Weak Multilinear Map Model
Theory of Cryptography
2016-12-22Paper
Strong hardness of privacy from weak traitor tracing
Theory of Cryptography
2016-12-21Paper
The Magic of ELFs
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Post-zeroizing obfuscation: new mathematical tools, and the case of evasive circuits
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Anonymous traitor tracing: how to embed arbitrary information in a key
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Functional encryption without obfuscation
Theory of Cryptography
2016-04-08Paper
How to avoid obfuscation using witness PRFs
Theory of Cryptography
2016-04-08Paper
Cutting-edge cryptography through the lens of secret sharing
Theory of Cryptography
2016-04-08Paper
Order-revealing encryption and the hardness of private learning
Theory of Cryptography
2016-03-23Paper
scientific article; zbMATH DE number 6492475 (Why is no real title available?)2015-10-09Paper
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Low overhead broadcast encryption from multilinear maps
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Secure signatures and chosen ciphertext security in a quantum computing world
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Quantum-secure message authentication codes
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Secure identity-based encryption in the quantum random oracle model
Lecture Notes in Computer Science
2012-09-25Paper
Random oracles in a quantum world
Lecture Notes in Computer Science
2011-12-02Paper


Research outcomes over time


This page was built for person: Mark Zhandry