Mark Simkin

From MaRDI portal
Person:1656026



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
OCash: fully anonymous payments between blockchain light clients2025-07-29Paper
The power of NAPs: compressing OR-proofs via collision-resistant hashing2025-07-23Paper
Jackpot: non-interactive aggregatable lotteries2025-07-03Paper
Extractable witness encryption for KZG commitments and efficient laconic OT2025-07-03Paper
FRIDA: data availability sampling from FRI2024-12-13Paper
Interactive non-malleable codes against desynchronizing attacks in the multi-party setting2024-11-22Paper
Distributed shuffling in adversarial environments2024-11-22Paper
Stronger lower bounds for leakage-resilient secret sharing2024-10-16Paper
Multiparty computation with covert security and public verifiability2024-06-25Paper
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
IEEE Transactions on Information Theory
2024-03-14Paper
How to compress encrypted data
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
scientific article; zbMATH DE number 7788479 (Why is no real title available?)2024-01-15Paper
Threshold private set intersection with better communication complexity
Lecture Notes in Computer Science
2023-11-16Paper
scientific article; zbMATH DE number 7759457 (Why is no real title available?)2023-11-02Paper
On sufficient oracles for secure computation with identifiable abort
Lecture Notes in Computer Science
2023-07-25Paper
Secret sharing lower bound: either reconstruction is hard or shares are long2022-12-16Paper
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model2022-12-07Paper
Black-box transformations from passive to covert security with public verifiability2022-11-09Paper
Property-preserving hash functions for Hamming distance from standard assumptions
(available as arXiv preprint)
2022-08-30Paper
Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source Extractors
IEEE Transactions on Information Theory
2022-08-19Paper
On publicly-accountable zero-knowledge and small shuffle arguments2021-12-21Paper
Robust property-preserving hash functions for Hamming distance and more2021-12-08Paper
The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free2021-12-08Paper
Lower bounds for leakage-resilient secret sharing2021-12-01Paper
Lower bounds for multi-server oblivious RAMs2021-12-01Paper
Perfectly secure oblivious RAM with sublinear bandwidth overhead2020-05-05Paper
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures2020-03-09Paper
The communication complexity of threshold private set intersection2020-03-09Paper
Continuously non-malleable codes with split-state refresh
Theoretical Computer Science
2019-01-18Paper
Yet another compiler for active security or: efficient MPC over arbitrary rings2018-09-26Paper
Continuously non-malleable codes with split-state refresh
Applied Cryptography and Network Security
2018-08-10Paper
Compact zero-knowledge proofs of small Hamming weight2018-05-29Paper
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Nearly optimal verifiable data streaming
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Webtrust -- a comprehensive authenticity and integrity framework for HTTP
Applied Cryptography and Network Security
2014-07-07Paper


Research outcomes over time


This page was built for person: Mark Simkin