Rafael Pass

From MaRDI portal
Person:332269

Available identifiers

zbMath Open pass.rafaelWikidataQ102305583 ScholiaQ102305583MaRDI QIDQ332269

List of research outcomes





PublicationDate of PublicationType
Leakage-resilient hardness vs randomness2024-11-19Paper
Public-coin, complexity-preserving, succinct arguments of knowledge for NP from collision-resistance2024-11-13Paper
A direct PRF construction from Kolmogorov complexity2024-11-13Paper
Simplex consensus: a simple and fast consensus protocol2024-08-15Paper
Counting unpredictable bits: a simple PRG from one-way functions2024-08-01Paper
On one-way functions and sparse languages2024-08-01Paper
Characterizing derandomization through hardness of Levin-Kolmogorov complexity2024-07-05Paper
On one-way functions from NP-complete problems2024-07-05Paper
Bucket oblivious sort: an extremely simple oblivious sort2024-05-14Paper
One-way functions and the hardness of (probabilistic) time-bounded Kolmogorov complexity w.r.t. samplable distributions2024-02-02Paper
Indistinguishability obfuscation from circular security2023-11-14Paper
Cryptography from sublinear-time average-case hardness of time-bounded Kolmogorov complexity2023-11-14Paper
Concurrently composable non-interactive secure computation2023-08-25Paper
Parallelizable delegation from LWE2023-08-14Paper
SPARKs: Succinct Parallelizable Arguments of Knowledge2023-04-27Paper
Non-malleable time-lock puzzles and applications2023-04-13Paper
One-Way Functions and (Im)perfect Obfuscation2023-04-04Paper
On the adaptive security of MACs and PRFs2023-03-21Paper
Communication complexity of Byzantine agreement, revisited2023-03-14Paper
Hybrid consensus: efficient consensus in the permissionless model2023-02-03Paper
Impossibility of strong KDM security with auxiliary input2022-12-16Paper
Unprovability of leakage-resilient cryptography beyond the information-theoretic limit2022-12-16Paper
On the complexity of compressing obfuscation2022-07-18Paper
Non-malleable codes for bounded parallel-time tampering2022-04-22Paper
On the possibility of basing cryptography on \(\mathsf{EXP}\ne \mathsf{BPP} \)2022-03-31Paper
Succinct non-interactive secure computation2022-03-23Paper
Locality-preserving oblivious RAM2022-03-03Paper
https://portal.mardi4nfdi.de/entity/Q50185142021-12-20Paper
https://portal.mardi4nfdi.de/entity/Q33840772021-12-14Paper
https://portal.mardi4nfdi.de/entity/Q50153862021-12-07Paper
Continuous verifiable delay functions2021-12-01Paper
SPARKs: succinct parallelizable arguments of knowledge2021-12-01Paper
Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?2021-12-01Paper
Sublinear-round Byzantine agreement under corrupt majority2021-12-01Paper
Minimizing trust in hardware wallets with two factor signatures2021-03-17Paper
Communication Complexity of Byzantine Agreement, Revisited2021-01-20Paper
Bayesian games with intentions2020-10-26Paper
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles2020-08-25Paper
On the complexity of compressing obfuscation2020-06-30Paper
Synchronous, with a chance of partition tolerance2020-05-20Paper
Non-uniformly sound certificates with applications to concurrent zero-knowledge2020-03-09Paper
Locality-preserving oblivious RAM2020-02-06Paper
On the existence of Nash equilibrium in games with resource-bounded players2020-02-04Paper
https://portal.mardi4nfdi.de/entity/Q52410682019-10-29Paper
The truth behind the myth of the folk theorem2019-09-19Paper
Socially Optimal Mining Pools2019-01-30Paper
Tight Revenue Bounds With Possibilistic Beliefs and Level-k Rationality2019-01-30Paper
On the security loss of unique signatures2018-12-11Paper
Game theoretic notions of fairness in multi-party coin toss2018-12-11Paper
Achieving fair treatment in algorithmic classification2018-12-11Paper
Game theory with translucent players2018-11-09Paper
Thunderella: blockchains with optimistic instant confirmation2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
The sleepy model of consensus2018-03-08Paper
Can we access a database both locally and privately?2018-01-19Paper
On the impossibility of cryptography with tamperable randomness2018-01-05Paper
FruitChains2017-10-11Paper
Reasoning about rationality2017-08-17Paper
Analysis of the Blockchain Protocol in Asynchronous Networks2017-06-13Paper
Formal Abstractions for Attested Execution Secure Processors2017-06-13Paper
The truth behind the myth of the folk theorem2017-05-19Paper
On the power of many one-bit provers2017-05-16Paper
Can theories be tested?2017-05-16Paper
On the power of nonuniformity in proofs of security2017-05-16Paper
Unprovable security of perfect NIZK and non-interactive non-malleable commitments2016-10-28Paper
Bounded KDM Security from iO and OWF2016-10-21Paper
Adaptive hardness and composable security in the plain model from standard assumptions2016-09-23Paper
https://portal.mardi4nfdi.de/entity/Q57404462016-07-26Paper
Non-black-box simulation from one-way functions and applications to resettable security2016-04-25Paper
Indistinguishability Obfuscation with Non-trivial Efficiency2016-04-13Paper
Oblivious Parallel RAM and Applications2016-04-08Paper
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings2016-03-23Paper
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation2016-03-23Paper
Output-Compressing Randomized Encodings and Applications2016-03-23Paper
Limits of Extractability Assumptions with Distributional Auxiliary Input2016-03-23Paper
Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs2015-12-10Paper
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation2015-12-10Paper
A Parallel Repetition Theorem for Constant-Round Arthur-Merlin Proofs2015-09-24Paper
Succinct Randomized Encodings and their Applications2015-08-21Paper
Constant-Round Nonmalleable Commitments from Any One-Way Function2015-08-14Paper
Outlier Privacy2015-07-06Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma2015-07-06Paper
Tight Parallel Repetition Theorems for Public-Coin Arguments Using KL-Divergence2015-07-06Paper
From Weak to Strong Zero-Knowledge and Applications2015-07-06Paper
Algorithmic rationality: game theory with costly computation2015-02-13Paper
Non-malleability amplification2015-02-04Paper
A unified framework for concurrent security2015-02-04Paper
On the Impossibility of Black-Box Transformations in Mechanism Design2015-01-14Paper
Not Just an Empty Threat: Subgame-Perfect Equilibrium in Repeated Games Played by Computationally Bounded Players2015-01-07Paper
Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead2015-01-06Paper
Local zero knowledge2014-11-25Paper
Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings2014-08-07Paper
Non-black-box simulation from one-way functions and applications to resettable security2014-08-07Paper
On the Impossibility of Cryptography with Tamperable Randomness2014-08-07Paper
The Randomness Complexity of Parallel Repetition2014-07-30Paper
Constant-round non-malleable commitments from any one-way function2014-06-05Paper
Limits of provable security from standard assumptions2014-06-05Paper
Concurrent zero knowledge, revisited2014-04-01Paper
Conservative belief and rationality2014-02-21Paper
4-Round Resettably-Sound Zero Knowledge2014-02-18Paper
On Extractability Obfuscation2014-02-18Paper
Public-coin parallel zero-knowledge for NP2013-04-15Paper
A Unified Framework for UC from Only OT2013-03-19Paper
Randomness-Dependent Message Security2013-03-18Paper
Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments2013-03-18Paper
The Curious Case of Non-Interactive Commitments – On the Power of Black-Box vs. Non-Black-Box Use of Primitives2012-09-25Paper
Black-Box Constructions of Composable Protocols without Set-Up2012-09-25Paper
Crowd-Blending Privacy2012-09-25Paper
Multi-verifier signatures2012-07-03Paper
The Knowledge Tightness of Parallel Zero-Knowledge2012-06-15Paper
On the Composition of Public-Coin Zero-Knowledge Protocols2012-03-15Paper
Iterated regret minimization: a new solution concept2012-03-05Paper
Secure computation without authentication2012-01-13Paper
Concurrent Security and Non-malleability2011-05-19Paper
Towards Non-Black-Box Lower Bounds in Cryptography2011-05-19Paper
Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy2011-05-19Paper
Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs2011-05-19Paper
Concurrent Non-Malleable Zero Knowledge Proofs2010-08-24Paper
New and improved constructions of non-malleable cryptographic protocols2010-08-16Paper
Bounded-concurrent secure multi-party computation with a dishonest majority2010-08-15Paper
Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions2010-06-01Paper
Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model2010-02-24Paper
An Efficient Parallel Repetition Theorem2010-02-24Paper
Private Coins versus Public Coins in Zero-Knowledge Proof Systems2010-02-24Paper
On the Composition of Public-Coin Zero-Knowledge Protocols2009-10-20Paper
Theory of Cryptography2009-05-14Paper
New and Improved Constructions of Nonmalleable Cryptographic Protocols2009-04-30Paper
Black-Box Constructions of Two-Party Protocols from One-Way Functions2009-03-03Paper
Adaptive One-Way Functions and Applications2009-02-10Paper
Concurrent Nonmalleable Commitments2008-12-22Paper
Bounded CCA2-Secure Encryption2008-05-15Paper
Relations Among Notions of Non-malleability for Encryption2008-05-15Paper
Precise Concurrent Zero Knowledge2008-04-15Paper
Unconditional Characterizations of Non-interactive Zero-Knowledge2008-03-17Paper
Secure Computation Without Authentication2008-03-17Paper
Concurrent Non-malleable Commitments from Any One-Way Function2008-03-05Paper
On Constant-Round Concurrent Zero-Knowledge2008-03-05Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One2007-09-04Paper
Universally Composable Security with Global Setup2007-08-30Paper
https://portal.mardi4nfdi.de/entity/Q44348742003-11-26Paper

Research outcomes over time

This page was built for person: Rafael Pass