Publication | Date of Publication | Type |
---|
One-way functions and the hardness of (probabilistic) time-bounded Kolmogorov complexity w.r.t. samplable distributions | 2024-02-02 | Paper |
Cryptography from sublinear-time average-case hardness of time-bounded Kolmogorov complexity | 2023-11-14 | Paper |
Indistinguishability obfuscation from circular security | 2023-11-14 | Paper |
Concurrently composable non-interactive secure computation | 2023-08-25 | Paper |
Parallelizable delegation from LWE | 2023-08-14 | Paper |
SPARKs: Succinct Parallelizable Arguments of Knowledge | 2023-04-27 | Paper |
Non-malleable time-lock puzzles and applications | 2023-04-13 | Paper |
One-Way Functions and (Im)perfect Obfuscation | 2023-04-04 | Paper |
On the adaptive security of MACs and PRFs | 2023-03-21 | Paper |
Communication complexity of Byzantine agreement, revisited | 2023-03-14 | Paper |
Impossibility of strong KDM security with auxiliary input | 2022-12-16 | Paper |
Unprovability of leakage-resilient cryptography beyond the information-theoretic limit | 2022-12-16 | Paper |
On the complexity of compressing obfuscation | 2022-07-18 | Paper |
Non-malleable codes for bounded parallel-time tampering | 2022-04-22 | Paper |
On the possibility of basing cryptography on \(\mathsf{EXP}\ne \mathsf{BPP} \) | 2022-03-31 | Paper |
Succinct non-interactive secure computation | 2022-03-23 | Paper |
Locality-preserving oblivious RAM | 2022-03-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q5018514 | 2021-12-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3384077 | 2021-12-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q5015386 | 2021-12-07 | Paper |
SPARKs: succinct parallelizable arguments of knowledge | 2021-12-01 | Paper |
Continuous verifiable delay functions | 2021-12-01 | Paper |
Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions? | 2021-12-01 | Paper |
Sublinear-round Byzantine agreement under corrupt majority | 2021-12-01 | Paper |
Minimizing trust in hardware wallets with two factor signatures | 2021-03-17 | Paper |
Communication Complexity of Byzantine Agreement, Revisited | 2021-01-20 | Paper |
Bayesian games with intentions | 2020-10-26 | Paper |
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles | 2020-08-25 | Paper |
On the complexity of compressing obfuscation | 2020-06-30 | Paper |
Synchronous, with a chance of partition tolerance | 2020-05-20 | Paper |
Non-uniformly sound certificates with applications to concurrent zero-knowledge | 2020-03-09 | Paper |
Locality-preserving oblivious RAM | 2020-02-06 | Paper |
On the existence of Nash equilibrium in games with resource-bounded players | 2020-02-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q5241068 | 2019-10-29 | Paper |
The truth behind the myth of the folk theorem | 2019-09-19 | Paper |
Socially Optimal Mining Pools | 2019-01-30 | Paper |
Tight Revenue Bounds With Possibilistic Beliefs and Level-k Rationality | 2019-01-30 | Paper |
On the security loss of unique signatures | 2018-12-11 | Paper |
Game theoretic notions of fairness in multi-party coin toss | 2018-12-11 | Paper |
Achieving fair treatment in algorithmic classification | 2018-12-11 | Paper |
Game theory with translucent players | 2018-11-09 | Paper |
Thunderella: blockchains with optimistic instant confirmation | 2018-07-09 | Paper |
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings | 2018-07-04 | Paper |
The sleepy model of consensus | 2018-03-08 | Paper |
Can we access a database both locally and privately? | 2018-01-19 | Paper |
On the impossibility of cryptography with tamperable randomness | 2018-01-05 | Paper |
FruitChains | 2017-10-11 | Paper |
Reasoning about rationality | 2017-08-17 | Paper |
Formal Abstractions for Attested Execution Secure Processors | 2017-06-13 | Paper |
Analysis of the Blockchain Protocol in Asynchronous Networks | 2017-06-13 | Paper |
The truth behind the myth of the folk theorem | 2017-05-19 | Paper |
Can theories be tested? | 2017-05-16 | Paper |
On the power of many one-bit provers | 2017-05-16 | Paper |
On the power of nonuniformity in proofs of security | 2017-05-16 | Paper |
Unprovable security of perfect NIZK and non-interactive non-malleable commitments | 2016-10-28 | Paper |
Bounded KDM Security from iO and OWF | 2016-10-21 | Paper |
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions | 2016-09-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q5740446 | 2016-07-26 | Paper |
Non-Black-Box Simulation from One-Way Functions and Applications to Resettable Security | 2016-04-25 | Paper |
Indistinguishability Obfuscation with Non-trivial Efficiency | 2016-04-13 | Paper |
Oblivious Parallel RAM and Applications | 2016-04-08 | Paper |
Limits of Extractability Assumptions with Distributional Auxiliary Input | 2016-03-23 | Paper |
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings | 2016-03-23 | Paper |
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation | 2016-03-23 | Paper |
Output-Compressing Randomized Encodings and Applications | 2016-03-23 | Paper |
Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs | 2015-12-10 | Paper |
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation | 2015-12-10 | Paper |
A Parallel Repetition Theorem for Constant-Round Arthur-Merlin Proofs | 2015-09-24 | Paper |
Succinct Randomized Encodings and their Applications | 2015-08-21 | Paper |
Constant-Round Nonmalleable Commitments from Any One-Way Function | 2015-08-14 | Paper |
From Weak to Strong Zero-Knowledge and Applications | 2015-07-06 | Paper |
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma | 2015-07-06 | Paper |
Tight Parallel Repetition Theorems for Public-Coin Arguments Using KL-Divergence | 2015-07-06 | Paper |
Outlier Privacy | 2015-07-06 | Paper |
Algorithmic rationality: game theory with costly computation | 2015-02-13 | Paper |
A unified framework for concurrent security | 2015-02-04 | Paper |
Non-malleability amplification | 2015-02-04 | Paper |
On the Impossibility of Black-Box Transformations in Mechanism Design | 2015-01-14 | Paper |
Not Just an Empty Threat: Subgame-Perfect Equilibrium in Repeated Games Played by Computationally Bounded Players | 2015-01-07 | Paper |
Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead | 2015-01-06 | Paper |
Local zero knowledge | 2014-11-25 | Paper |
Non-black-box simulation from one-way functions and applications to resettable security | 2014-08-07 | Paper |
On the Impossibility of Cryptography with Tamperable Randomness | 2014-08-07 | Paper |
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings | 2014-08-07 | Paper |
The Randomness Complexity of Parallel Repetition | 2014-07-30 | Paper |
Constant-round non-malleable commitments from any one-way function | 2014-06-05 | Paper |
Limits of provable security from standard assumptions | 2014-06-05 | Paper |
Concurrent zero knowledge, revisited | 2014-04-01 | Paper |
Conservative belief and rationality | 2014-02-21 | Paper |
On Extractability Obfuscation | 2014-02-18 | Paper |
4-Round Resettably-Sound Zero Knowledge | 2014-02-18 | Paper |
Public-coin parallel zero-knowledge for NP | 2013-04-15 | Paper |
A Unified Framework for UC from Only OT | 2013-03-19 | Paper |
Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments | 2013-03-18 | Paper |
Randomness-Dependent Message Security | 2013-03-18 | Paper |
Black-Box Constructions of Composable Protocols without Set-Up | 2012-09-25 | Paper |
Crowd-Blending Privacy | 2012-09-25 | Paper |
The Curious Case of Non-Interactive Commitments – On the Power of Black-Box vs. Non-Black-Box Use of Primitives | 2012-09-25 | Paper |
Multi-verifier signatures | 2012-07-03 | Paper |
The Knowledge Tightness of Parallel Zero-Knowledge | 2012-06-15 | Paper |
On the Composition of Public-Coin Zero-Knowledge Protocols | 2012-03-15 | Paper |
Iterated regret minimization: a new solution concept | 2012-03-05 | Paper |
Secure computation without authentication | 2012-01-13 | Paper |
Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs | 2011-05-19 | Paper |
Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy | 2011-05-19 | Paper |
Concurrent Security and Non-malleability | 2011-05-19 | Paper |
Towards Non-Black-Box Lower Bounds in Cryptography | 2011-05-19 | Paper |
Concurrent Non-Malleable Zero Knowledge Proofs | 2010-08-24 | Paper |
New and improved constructions of non-malleable cryptographic protocols | 2010-08-16 | Paper |
Bounded-concurrent secure multi-party computation with a dishonest majority | 2010-08-15 | Paper |
Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions | 2010-06-01 | Paper |
An Efficient Parallel Repetition Theorem | 2010-02-24 | Paper |
Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model | 2010-02-24 | Paper |
Private Coins versus Public Coins in Zero-Knowledge Proof Systems | 2010-02-24 | Paper |
On the Composition of Public-Coin Zero-Knowledge Protocols | 2009-10-20 | Paper |
Theory of Cryptography | 2009-05-14 | Paper |
New and Improved Constructions of Nonmalleable Cryptographic Protocols | 2009-04-30 | Paper |
Black-Box Constructions of Two-Party Protocols from One-Way Functions | 2009-03-03 | Paper |
Adaptive One-Way Functions and Applications | 2009-02-10 | Paper |
Concurrent Nonmalleable Commitments | 2008-12-22 | Paper |
Bounded CCA2-Secure Encryption | 2008-05-15 | Paper |
Relations Among Notions of Non-malleability for Encryption | 2008-05-15 | Paper |
Precise Concurrent Zero Knowledge | 2008-04-15 | Paper |
Unconditional Characterizations of Non-interactive Zero-Knowledge | 2008-03-17 | Paper |
Secure Computation Without Authentication | 2008-03-17 | Paper |
On Constant-Round Concurrent Zero-Knowledge | 2008-03-05 | Paper |
Concurrent Non-malleable Commitments from Any One-Way Function | 2008-03-05 | Paper |
Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One | 2007-09-04 | Paper |
Universally Composable Security with Global Setup | 2007-08-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434874 | 2003-11-26 | Paper |