Rafael Pass

From MaRDI portal
Person:332269

Available identifiers

zbMath Open pass.rafaelMaRDI QIDQ332269

List of research outcomes

PublicationDate of PublicationType
One-way functions and the hardness of (probabilistic) time-bounded Kolmogorov complexity w.r.t. samplable distributions2024-02-02Paper
Cryptography from sublinear-time average-case hardness of time-bounded Kolmogorov complexity2023-11-14Paper
Indistinguishability obfuscation from circular security2023-11-14Paper
Concurrently composable non-interactive secure computation2023-08-25Paper
Parallelizable delegation from LWE2023-08-14Paper
SPARKs: Succinct Parallelizable Arguments of Knowledge2023-04-27Paper
Non-malleable time-lock puzzles and applications2023-04-13Paper
One-Way Functions and (Im)perfect Obfuscation2023-04-04Paper
On the adaptive security of MACs and PRFs2023-03-21Paper
Communication complexity of Byzantine agreement, revisited2023-03-14Paper
Impossibility of strong KDM security with auxiliary input2022-12-16Paper
Unprovability of leakage-resilient cryptography beyond the information-theoretic limit2022-12-16Paper
On the complexity of compressing obfuscation2022-07-18Paper
Non-malleable codes for bounded parallel-time tampering2022-04-22Paper
On the possibility of basing cryptography on \(\mathsf{EXP}\ne \mathsf{BPP} \)2022-03-31Paper
Succinct non-interactive secure computation2022-03-23Paper
Locality-preserving oblivious RAM2022-03-03Paper
https://portal.mardi4nfdi.de/entity/Q50185142021-12-20Paper
https://portal.mardi4nfdi.de/entity/Q33840772021-12-14Paper
https://portal.mardi4nfdi.de/entity/Q50153862021-12-07Paper
SPARKs: succinct parallelizable arguments of knowledge2021-12-01Paper
Continuous verifiable delay functions2021-12-01Paper
Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?2021-12-01Paper
Sublinear-round Byzantine agreement under corrupt majority2021-12-01Paper
Minimizing trust in hardware wallets with two factor signatures2021-03-17Paper
Communication Complexity of Byzantine Agreement, Revisited2021-01-20Paper
Bayesian games with intentions2020-10-26Paper
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles2020-08-25Paper
On the complexity of compressing obfuscation2020-06-30Paper
Synchronous, with a chance of partition tolerance2020-05-20Paper
Non-uniformly sound certificates with applications to concurrent zero-knowledge2020-03-09Paper
Locality-preserving oblivious RAM2020-02-06Paper
On the existence of Nash equilibrium in games with resource-bounded players2020-02-04Paper
https://portal.mardi4nfdi.de/entity/Q52410682019-10-29Paper
The truth behind the myth of the folk theorem2019-09-19Paper
Socially Optimal Mining Pools2019-01-30Paper
Tight Revenue Bounds With Possibilistic Beliefs and Level-k Rationality2019-01-30Paper
On the security loss of unique signatures2018-12-11Paper
Game theoretic notions of fairness in multi-party coin toss2018-12-11Paper
Achieving fair treatment in algorithmic classification2018-12-11Paper
Game theory with translucent players2018-11-09Paper
Thunderella: blockchains with optimistic instant confirmation2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
The sleepy model of consensus2018-03-08Paper
Can we access a database both locally and privately?2018-01-19Paper
On the impossibility of cryptography with tamperable randomness2018-01-05Paper
FruitChains2017-10-11Paper
Reasoning about rationality2017-08-17Paper
Formal Abstractions for Attested Execution Secure Processors2017-06-13Paper
Analysis of the Blockchain Protocol in Asynchronous Networks2017-06-13Paper
The truth behind the myth of the folk theorem2017-05-19Paper
Can theories be tested?2017-05-16Paper
On the power of many one-bit provers2017-05-16Paper
On the power of nonuniformity in proofs of security2017-05-16Paper
Unprovable security of perfect NIZK and non-interactive non-malleable commitments2016-10-28Paper
Bounded KDM Security from iO and OWF2016-10-21Paper
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions2016-09-23Paper
https://portal.mardi4nfdi.de/entity/Q57404462016-07-26Paper
Non-Black-Box Simulation from One-Way Functions and Applications to Resettable Security2016-04-25Paper
Indistinguishability Obfuscation with Non-trivial Efficiency2016-04-13Paper
Oblivious Parallel RAM and Applications2016-04-08Paper
Limits of Extractability Assumptions with Distributional Auxiliary Input2016-03-23Paper
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings2016-03-23Paper
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation2016-03-23Paper
Output-Compressing Randomized Encodings and Applications2016-03-23Paper
Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs2015-12-10Paper
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation2015-12-10Paper
A Parallel Repetition Theorem for Constant-Round Arthur-Merlin Proofs2015-09-24Paper
Succinct Randomized Encodings and their Applications2015-08-21Paper
Constant-Round Nonmalleable Commitments from Any One-Way Function2015-08-14Paper
From Weak to Strong Zero-Knowledge and Applications2015-07-06Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma2015-07-06Paper
Tight Parallel Repetition Theorems for Public-Coin Arguments Using KL-Divergence2015-07-06Paper
Outlier Privacy2015-07-06Paper
Algorithmic rationality: game theory with costly computation2015-02-13Paper
A unified framework for concurrent security2015-02-04Paper
Non-malleability amplification2015-02-04Paper
On the Impossibility of Black-Box Transformations in Mechanism Design2015-01-14Paper
Not Just an Empty Threat: Subgame-Perfect Equilibrium in Repeated Games Played by Computationally Bounded Players2015-01-07Paper
Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead2015-01-06Paper
Local zero knowledge2014-11-25Paper
Non-black-box simulation from one-way functions and applications to resettable security2014-08-07Paper
On the Impossibility of Cryptography with Tamperable Randomness2014-08-07Paper
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings2014-08-07Paper
The Randomness Complexity of Parallel Repetition2014-07-30Paper
Constant-round non-malleable commitments from any one-way function2014-06-05Paper
Limits of provable security from standard assumptions2014-06-05Paper
Concurrent zero knowledge, revisited2014-04-01Paper
Conservative belief and rationality2014-02-21Paper
On Extractability Obfuscation2014-02-18Paper
4-Round Resettably-Sound Zero Knowledge2014-02-18Paper
Public-coin parallel zero-knowledge for NP2013-04-15Paper
A Unified Framework for UC from Only OT2013-03-19Paper
Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments2013-03-18Paper
Randomness-Dependent Message Security2013-03-18Paper
Black-Box Constructions of Composable Protocols without Set-Up2012-09-25Paper
Crowd-Blending Privacy2012-09-25Paper
The Curious Case of Non-Interactive Commitments – On the Power of Black-Box vs. Non-Black-Box Use of Primitives2012-09-25Paper
Multi-verifier signatures2012-07-03Paper
The Knowledge Tightness of Parallel Zero-Knowledge2012-06-15Paper
On the Composition of Public-Coin Zero-Knowledge Protocols2012-03-15Paper
Iterated regret minimization: a new solution concept2012-03-05Paper
Secure computation without authentication2012-01-13Paper
Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs2011-05-19Paper
Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy2011-05-19Paper
Concurrent Security and Non-malleability2011-05-19Paper
Towards Non-Black-Box Lower Bounds in Cryptography2011-05-19Paper
Concurrent Non-Malleable Zero Knowledge Proofs2010-08-24Paper
New and improved constructions of non-malleable cryptographic protocols2010-08-16Paper
Bounded-concurrent secure multi-party computation with a dishonest majority2010-08-15Paper
Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions2010-06-01Paper
An Efficient Parallel Repetition Theorem2010-02-24Paper
Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model2010-02-24Paper
Private Coins versus Public Coins in Zero-Knowledge Proof Systems2010-02-24Paper
On the Composition of Public-Coin Zero-Knowledge Protocols2009-10-20Paper
Theory of Cryptography2009-05-14Paper
New and Improved Constructions of Nonmalleable Cryptographic Protocols2009-04-30Paper
Black-Box Constructions of Two-Party Protocols from One-Way Functions2009-03-03Paper
Adaptive One-Way Functions and Applications2009-02-10Paper
Concurrent Nonmalleable Commitments2008-12-22Paper
Bounded CCA2-Secure Encryption2008-05-15Paper
Relations Among Notions of Non-malleability for Encryption2008-05-15Paper
Precise Concurrent Zero Knowledge2008-04-15Paper
Unconditional Characterizations of Non-interactive Zero-Knowledge2008-03-17Paper
Secure Computation Without Authentication2008-03-17Paper
On Constant-Round Concurrent Zero-Knowledge2008-03-05Paper
Concurrent Non-malleable Commitments from Any One-Way Function2008-03-05Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One2007-09-04Paper
Universally Composable Security with Global Setup2007-08-30Paper
https://portal.mardi4nfdi.de/entity/Q44348742003-11-26Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Rafael Pass