Omer Paneth

From MaRDI portal
(Redirected from Person:1688396)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Incrementally verifiable computation via rate-1 batch arguments2025-08-15Paper
On the cryptographic hardness of finding a Nash equilibrium2025-08-05Paper
From the impossibility of obfuscation to a new non-black-box simulation technique2025-05-05Paper
Reusable online-efficient commitments2024-12-13Paper
Public-coin, complexity-preserving, succinct arguments of knowledge for NP from collision-resistance2024-11-13Paper
Monotone-policy aggregate signatures2024-11-13Paper
Non-interactive universal arguments
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
SNARGs for monotone policy batch NP
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Verifiable private information retrieval
Theory of Cryptography
2023-08-14Paper
PPAD is as hard as LWE and iterated squaring
Theory of Cryptography
2023-08-14Paper
Delegation with updatable unambiguous proofs and PPAD-hardness2022-12-07Paper
Succinct non-interactive arguments via linear interactive proofs
Journal of Cryptology
2022-05-10Paper
Weak Zero-Knowledge beyond the Black-Box Barrier
SIAM Journal on Computing
2022-02-08Paper
Weakly extractable one-way functions2021-12-01Paper
Incrementally verifiable computation via incremental PCPs2020-04-30Paper
On round optimal statistical zero knowledge arguments2020-03-09Paper
How to delegate computations publicly
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Weak zero-knowledge beyond the black-box barrier
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Multi-collision resistance: a paradigm for keyless hash functions
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
On zero-testable homomorphic encryption and publicly verifiable non-interactive arguments2018-01-19Paper
On virtual grey box obfuscation for general circuits
Algorithmica
2018-01-05Paper
On Removing Graded Encodings from Functional Encryption
Lecture Notes in Computer Science
2017-06-13Paper
Delegating RAM Computations
Theory of Cryptography
2016-12-22Paper
3-message zero knowledge against human ignorance
Theory of Cryptography
2016-12-21Paper
On the existence of extractable one-way functions
SIAM Journal on Computing
2016-10-28Paper
Reusable fuzzy extractors for low-entropy distributions
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Time-lock puzzles from randomized encodings
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Perfect structure on the edge of chaos. Trapdoor permutations from indistinguishability obfuscation
Theory of Cryptography
2016-03-23Paper
On non-black-box simulation and the impossibility of approximate obfuscation
SIAM Journal on Computing
2015-11-04Paper
On obfuscation with random oracles
Theory of Cryptography
2015-07-06Paper
ZAPs and non-interactive witness indistinguishability from indistinguishability obfuscation
Theory of Cryptography
2015-07-06Paper
On the existence of extractable one-way functions
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
On virtual grey box obfuscation for general circuits
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On the impossibility of approximate obfuscation and applications to resettable cryptography
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
The impossibility of obfuscation with auxiliary input or a universal simulator
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Client-server concurrent zero knowledge with constant rounds and guaranteed complexity
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Protecting obfuscation against algebraic attacks
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Verifiable set operations over outsourced databases
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Obfuscation for evasive functions
Theory of Cryptography
2014-02-18Paper
On the achievability of simulation-based security for functional encryption
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Succinct non-interactive arguments via linear interactive proofs
Theory of Cryptography
2013-03-18Paper
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model
Theory of Cryptography
2013-03-18Paper
Point obfuscation and 3-round zero-knowledge
Theory of Cryptography
2012-06-15Paper


Research outcomes over time


This page was built for person: Omer Paneth