Guy N. Rothblum

From MaRDI portal
(Redirected from Person:385708)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Constant-round arguments for batch-verification and bounded-space computations from one-way functions2025-01-10Paper
On interactive proofs of proximity with proof-oblivious queries2024-09-25Paper
Decision-making under miscalibration2024-09-25Paper
Constant-round arguments from one-way functions2024-05-08Paper
scientific article; zbMATH DE number 7829309 (Why is no real title available?)2024-04-09Paper
scientific article; zbMATH DE number 7829324 (Why is no real title available?)
(available as arXiv preprint)
2024-04-09Paper
Indistinguishable predictions and multi-group fair learning
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Verifying the unseen: interactive proofs for label-invariant distribution properties
Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing
2023-12-08Paper
Outcome indistinguishability
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
2023-11-14Paper
On Prover-Efficient Public-Coin Emulation of Interactive Proofs2023-07-03Paper
scientific article; zbMATH DE number 7650364 (Why is no real title available?)
(available as arXiv preprint)
2023-02-03Paper
Worst-Case to Average-Case Reductions for Subclasses of P
Lecture Notes in Computer Science
2022-08-30Paper
Constant-Round Interactive Proof Systems for AC0[2 and NC1]
Lecture Notes in Computer Science
2022-08-30Paper
Batch verification for statistical zero knowledge proofs2022-03-23Paper
Batch verification and proofs of proximity with polylog overhead2022-03-23Paper
Constant-round interactive proofs for delegating computation
SIAM Journal on Computing
2021-06-29Paper
Simple doubly-efficient interactive proof systems for locally-characterizable sets2021-06-15Paper
scientific article; zbMATH DE number 7250162 (Why is no real title available?)2020-09-22Paper
Incrementally verifiable computation via incremental PCPs2020-04-30Paper
Fiat-Shamir: from practice to theory
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Gentle measurement of quantum states and differential privacy
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Fine-grained complexity meets \(\mathrm{IP} = \mathrm{PSPACE}\)
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms
2019-10-15Paper
Composable and versatile privacy via truncated CDP
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
Private data release via learning thresholds
(available as arXiv preprint)
2019-05-10Paper
Private data release via learning thresholds2019-05-10Paper
Delegating computation: interactive proofs for muggles
Journal of the ACM
2018-08-02Paper
On zero-testable homomorphic encryption and publicly verifiable non-interactive arguments2018-01-19Paper
From obfuscation to the security of Fiat-Shamir for proofs2017-11-15Paper
Constant-round interactive proofs for delegating computation
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
Black-box obfuscation for \(d\)-CNFs
Proceedings of the 5th conference on Innovations in theoretical computer science
2017-05-19Paper
Obfuscating conjunctions
Journal of Cryptology
2017-03-02Paper
Spooky interaction and its discontents: compilers for succinct two-message argument systems
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Pure differential privacy for rectangle queries via private partitions
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
The complexity of online memory checking
Journal of the ACM
2015-11-11Paper
How to Compute in the Presence of Leakage
SIAM Journal on Computing
2015-11-04Paper
On the complexity of differentially private data release, efficient algorithms and hardness results
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
On best-possible obfuscation
Journal of Cryptology
2014-09-25Paper
Differential privacy under continual observation
Proceedings of the forty-second ACM symposium on Theory of computing
2014-08-13Paper
Interactive proofs of proximity: delegating computation in sublinear time
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Fast pseudorandomness for independence and load balancing (extended abstract)
Automata, Languages, and Programming
2014-07-01Paper
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
Theory of Cryptography
2014-02-18Paper
Refereed delegation of computation
Information and Computation
2013-12-03Paper
Obfuscating conjunctions
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Two protocols for delegation of computation
Lecture Notes in Computer Science
2012-11-06Paper
How to compute under \({\mathcal{AC}}^{0}\) leakage without secure hardware
Lecture Notes in Computer Science
2012-09-25Paper
Securely obfuscating re-encryption
Journal of Cryptology
2012-01-13Paper
Program obfuscation with leaky hardware
Lecture Notes in Computer Science
2011-12-02Paper
Are PCPs inherent in efficient arguments?
Computational Complexity
2011-02-18Paper
Securing computation against continuous leakage
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Leakage-resilient signatures
Theory of Cryptography
2010-02-24Paper
Obfuscation of hyperplane membership
Theory of Cryptography
2010-02-24Paper
Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles
Theory of Computing Systems
2009-08-06Paper
How Efficient Can Memory Checking Be?
Theory of Cryptography
2009-03-03Paper
Weak Verifiable Random Functions
Theory of Cryptography
2009-03-03Paper
One-Time Programs
Lecture Notes in Computer Science
2009-02-10Paper
scientific article; zbMATH DE number 5485522 (Why is no real title available?)2009-01-05Paper
Verifying and decoding in constant depth2009-01-05Paper
scientific article; zbMATH DE number 5485525 (Why is no real title available?)2009-01-05Paper
The Complexity of Local List Decoding
Lecture Notes in Computer Science
2008-11-27Paper
Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles
Lecture Notes in Computer Science
2007-11-15Paper
On Best-Possible Obfuscation
Theory of Cryptography
2007-08-30Paper
Securely Obfuscating Re-encryption
Theory of Cryptography
2007-08-30Paper


Research outcomes over time


This page was built for person: Guy N. Rothblum