Ran Canetti

From MaRDI portal
Person:176997

Available identifiers

zbMath Open canetti.ranDBLPc/RanCanettiWikidataQ62007126 ScholiaQ62007126MaRDI QIDQ176997

List of research outcomes





PublicationDate of PublicationType
On the computational hardness needed for quantum cryptography2024-09-25Paper
Taming adaptivity in YOSO protocols: the modular way2024-08-02Paper
Triply adaptive UC NIZK2023-08-16Paper
Covert learning: how to learn with an untrusted intermediary2023-04-13Paper
Fully deniable interactive encryption2022-11-09Paper
COA-secure obfuscation and applications2022-08-30Paper
Unclonable polymers and their cryptographic applications2022-08-30Paper
Universally Composable Security2022-03-31Paper
Universal composition with global subroutines: capturing global setup within plain UC2022-03-23Paper
Towards multiparty computation withstanding coercion of all parties2022-03-23Paper
Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model2022-02-08Paper
Universally composable accumulators2020-08-05Paper
Fiat-Shamir: from practice to theory2020-01-30Paper
Certifying trapdoor permutations, revisited2018-12-11Paper
Fiat-Shamir and correlation intractability from strong KDM-secure encryption2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
Task-structured probabilistic I/O automata2018-04-18Paper
Optimal-rate non-committing encryption2018-02-23Paper
The hunting of the SNARK2018-02-15Paper
Towards doubly efficient private information retrieval2018-01-19Paper
On virtual grey box obfuscation for general circuits2018-01-05Paper
Maintaining authenticated communication in the presence of break-ins2017-09-29Paper
Randomness vs. fault-tolerance2017-09-29Paper
Equivocating Yao2017-08-17Paper
Better Two-Round Adaptive Multi-party Computation2017-06-13Paper
Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE2017-06-13Paper
Chosen-Ciphertext Secure Fully Homomorphic Encryption2017-06-13Paper
Adaptive Succinct Garbled RAM or: How to Delegate Your Database2016-12-22Paper
On the existence of extractable one-way functions2016-10-28Paper
Toward a game theoretic view of secure computation2016-10-13Paper
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again2016-10-07Paper
Secure computation with honest-looking parties: what if nobody is truly honest? (extended abstract)2016-09-29Paper
Adaptive hardness and composable security in the plain model from standard assumptions2016-09-23Paper
Reusable Fuzzy Extractors for Low-Entropy Distributions2016-09-09Paper
Fully succinct garbled RAM2016-04-15Paper
Universally Composable Authentication and Key-Exchange with Global PKI2016-04-13Paper
On the Correlation Intractability of Obfuscated Pseudorandom Functions2016-03-23Paper
Selective private function evaluation with applications to private statistics2016-03-04Paper
Concurrent Secure Computation with Optimal Query Complexity2015-12-10Paper
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation2015-12-10Paper
Keying Hash Functions for Message Authentication2015-11-11Paper
Succinct Garbling and Indistinguishability Obfuscation for RAM Programs2015-08-21Paper
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation2015-07-06Paper
Obfuscation of Probabilistic Circuits and Applications2015-07-06Paper
On Obfuscation with Random Oracles2015-07-06Paper
On the existence of extractable one-way functions2015-06-26Paper
Asynchronous secure computation2015-05-07Paper
Fast asynchronous Byzantine agreement with optimal resilience2015-05-07Paper
Black-box concurrent zero-knowledge requires \tilde {Ω} (log n ) rounds2015-02-27Paper
Secure Key Exchange and Sessions without Credentials2014-10-14Paper
Resettable zero-knowledge (extended abstract)2014-09-26Paper
On strong simulation and composable point obfuscation2014-09-25Paper
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity2014-08-07Paper
On Virtual Grey Box Obfuscation for General Circuits2014-08-07Paper
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator2014-08-07Paper
Recursive composition and bootstrapping for SNARKS and proof-carrying data2014-08-07Paper
Verifiable Set Operations over Outsourced Databases2014-03-25Paper
Obfuscation for Evasive Functions2014-02-18Paper
Refereed delegation of computation2013-12-03Paper
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model2013-03-18Paper
Two Protocols for Delegation of Computation2012-11-06Paper
Universally Composable Security with Local Adversaries2012-09-25Paper
Efficient Password Authenticated Key Exchange via Oblivious Transfer2012-07-20Paper
Leakage-Tolerant Interactive Protocols2012-06-15Paper
Secure computation without authentication2012-01-13Paper
Program Obfuscation with Leaky Hardware2011-12-02Paper
Towards a Game Theoretic View of Secure Computation2011-05-27Paper
Universally composable symbolic security analysis2011-04-01Paper
The random oracle methodology, revisited2011-02-01Paper
On Strong Simulation and Composable Point Obfuscation2010-08-24Paper
Universally composable two-party and multi-party secure computation2010-08-05Paper
On Symmetric Encryption and Point Obfuscation2010-02-24Paper
Obfuscation of Hyperplane Membership2010-02-24Paper
Analyzing security protocols using time-bounded task-PIOAs2009-05-29Paper
Theory of Cryptography2009-05-14Paper
Amplifying Collision Resistance: A Complexity-Theoretic Treatment2009-03-10Paper
Towards a Theory of Extractable Functions2009-03-03Paper
Non-malleable Obfuscation2009-03-03Paper
Just fast keying2008-12-21Paper
Modeling Computational Security in Long-Lived Systems2008-11-25Paper
Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols2008-09-09Paper
Extractable Perfectly One-Way Functions2008-08-19Paper
How to Protect Yourself without Perfect Shredding2008-08-19Paper
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust2008-05-15Paper
Universally Composable Password-Based Key Exchange2008-05-06Paper
Obfuscating Point Functions with Multibit Output2008-04-15Paper
Secure Computation Without Authentication2008-03-17Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Chosen‐Ciphertext Security from Identity‐Based Encryption2007-10-22Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Mitigating Dictionary Attacks on Password-Protected Local Storage2007-09-04Paper
Universally Composable Security with Global Setup2007-08-30Paper
A forward-secure public-key encryption scheme2007-08-20Paper
Theory of Cryptography2007-02-12Paper
On the limitations of universally composable two-party computation without set-up assumptions2006-08-14Paper
https://portal.mardi4nfdi.de/entity/Q33749292006-03-01Paper
Theory of Cryptography2005-12-07Paper
Theory of Cryptography2005-12-07Paper
Adaptive versus non-adaptive security of multi-party protocols2004-10-01Paper
https://portal.mardi4nfdi.de/entity/Q47372552004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44348802003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44348692003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44185872003-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44115352003-07-09Paper
https://portal.mardi4nfdi.de/entity/Q44091152003-06-30Paper
Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds2003-01-05Paper
https://portal.mardi4nfdi.de/entity/Q47837172002-12-08Paper
On the statistical properties of Diffie-Hellman distributions2002-11-12Paper
https://portal.mardi4nfdi.de/entity/Q45425392002-09-24Paper
https://portal.mardi4nfdi.de/entity/Q45425602002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q45425302002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q27788542002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27788612002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q42341102002-02-03Paper
https://portal.mardi4nfdi.de/entity/Q42341112002-02-03Paper
Security and composition of multiparty cryptographic protocols2000-11-27Paper
https://portal.mardi4nfdi.de/entity/Q49418502000-07-19Paper
Randomness versus fault-tolerance2000-05-08Paper
Maintaining authenticated communication in the presence of break-ins2000-05-08Paper
https://portal.mardi4nfdi.de/entity/Q49407142000-03-01Paper
Bandwidth Allocation with Preemption1999-10-28Paper
An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)1999-10-05Paper
https://portal.mardi4nfdi.de/entity/Q42507811999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42285211999-03-01Paper
Bounding the Power of Preemption in Randomized Scheduling1998-09-20Paper
https://portal.mardi4nfdi.de/entity/Q43645701998-03-17Paper
https://portal.mardi4nfdi.de/entity/Q43645441997-11-17Paper
On Certain Exponential Sums and the Distribution of Diffie-Hellman Triples1997-09-15Paper
Lower bounds for sampling algorithms for estimating the average1997-02-28Paper
More on BPP and the polynomial-time hierarchy1997-02-27Paper
Bounds on tradeoffs between randomness and communication complexity1993-10-18Paper

Research outcomes over time

This page was built for person: Ran Canetti