Zvika Brakerski

From MaRDI portal
Person:514474

Available identifiers

zbMath Open brakerski.zvikaMaRDI QIDQ514474

List of research outcomes

PublicationDate of PublicationType
https://portal.mardi4nfdi.de/entity/Q61262542024-04-09Paper
Black-hole radiation decoding is quantum cryptography2024-02-06Paper
Simple tests of quantumness also certify qubits2024-02-06Paper
SNARGs for monotone policy batch NP2024-02-02Paper
Quantum garbled circuits2023-12-08Paper
https://portal.mardi4nfdi.de/entity/Q60909042023-11-20Paper
Candidate iO from homomorphic encryption schemes2023-07-26Paper
Constructive post-quantum reductions2023-06-30Paper
Classical binding for quantum commitments2023-03-31Paper
https://portal.mardi4nfdi.de/entity/Q58743922023-02-07Paper
https://portal.mardi4nfdi.de/entity/Q58757782023-02-03Paper
A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device2022-12-08Paper
NIZK from LPN and trapdoor hash via correlation intractability for approximable relations2022-12-07Paper
Scalable pseudorandom quantum states2022-11-09Paper
Batch-OT with optimal rate2022-08-30Paper
Impossibility of quantum virtual black-box obfuscation of classical circuits2022-03-31Paper
Hardness of LWE on general entropic distributions2022-03-23Paper
Candidate iO from homomorphic encryption schemes2021-12-01Paper
Witness indistinguishability for any single-round argument with applications to access control2021-12-01Paper
Lossiness and entropic hardness for ring-LWE2021-12-01Paper
Constant ciphertext-rate non-committing encryption from standard assumptions2021-12-01Paper
FHE-based bootstrapping of designated-prover NIZK2021-12-01Paper
https://portal.mardi4nfdi.de/entity/Q50027892021-07-28Paper
Obfuscating circuits via composite-order graded encoding2021-07-02Paper
Perfect Secure Computation in Two Rounds2021-02-08Paper
Quantum FHE (almost) as secure as classical2020-06-30Paper
Order-LWE and the hardness of ring-LWE with entropic secrets2020-05-05Paper
(Pseudo) random quantum states with binary phase2020-04-30Paper
Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles2020-04-30Paper
Degree 2 is complete for the round-complexity of malicious MPC2020-02-06Paper
On quantum advantage in information theoretic single-server PIR2020-02-04Paper
Worst-case hardness for LPN and cryptographic hashing via code smoothing2020-02-04Paper
Fast Algorithms for Interactive Coding2019-05-15Paper
Perfect secure computation in two rounds2018-12-11Paper
Two-message statistically sender-private OT from LWE2018-12-06Paper
Zero-knowledge protocols for search problems2018-10-17Paper
Non-trivial witness encryption and null-iO from standard assumptions2018-10-17Paper
Anonymous IBE, leakage resilience and circular security from new assumptions2018-07-09Paper
Limits on low-degree pseudorandom generators (or: sum-of-squares meets program obfuscation)2018-07-09Paper
Learning with errors and extrapolated dihedral cosets2018-05-29Paper
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions2018-05-28Paper
https://portal.mardi4nfdi.de/entity/Q46380572018-05-03Paper
Function-private functional encryption in the private-key setting2018-04-26Paper
Succinct spooky free compilers are not black box sound2018-02-23Paper
Private constrained PRFs (and more) from LWE2018-01-19Paper
Four round secure computation without setup2018-01-19Paper
Non-interactive delegation and batch NP verification from standard computational assumptions2017-08-17Paper
FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime2017-06-13Paper
Lattice-based FHE as secure as PKE2017-05-19Paper
Black-box obfuscation for d-CNFs2017-05-19Paper
Obfuscating conjunctions2017-03-02Paper
Targeted Homomorphic Attribute-Based Encryption2016-12-22Paper
3-Message Zero Knowledge Against Human Ignorance2016-12-21Paper
Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts2016-11-30Paper
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security2016-11-09Paper
On Statistically Secure Obfuscation with Approximate Correctness2016-10-27Paper
(Leveled) Fully Homomorphic Encryption without Bootstrapping2016-10-24Paper
Shorter Circuit Obfuscation in Challenging Security Models2016-10-21Paper
(Leveled) fully homomorphic encryption without bootstrapping2016-10-07Paper
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions2016-07-15Paper
Obfuscating Conjunctions under Entropic Ring LWE2016-04-15Paper
From Selective to Adaptive Security in Functional Encryption2015-12-10Paper
Fast Interactive Coding against Adversarial Noise2015-08-14Paper
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions2015-07-06Paper
Function-Private Functional Encryption in the Private-Key Setting2015-07-06Paper
Obfuscating Circuits via Composite-Order Graded Encoding2015-07-06Paper
Better security for deterministic public-key encryption: the auxiliary-input setting2014-09-25Paper
Classical hardness of learning with errors2014-08-07Paper
Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$2014-07-30Paper
Efficient Fully Homomorphic Encryption from (Standard) LWE2014-07-30Paper
General perfectly periodic scheduling2014-07-25Paper
(Leveled) Fully Homomorphic Encryption without Bootstrapping2014-07-01Paper
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding2014-02-18Paper
Obfuscating Conjunctions2013-09-17Paper
Packed Ciphertexts in LWE-Based Homomorphic Encryption2013-04-19Paper
When Homomorphism Becomes a Liability2013-03-18Paper
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP2012-09-25Paper
A Parallel Repetition Theorem for Leakage Resilience2012-06-15Paper
Distributed discovery of large near-cliques2012-02-06Paper
From Absolute Distinguishability to Positive Distinguishability2011-08-19Paper
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages2011-08-12Paper
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting2011-08-12Paper
Black-Box Circular-Secure Encryption beyond Affine Functions2011-05-19Paper
Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions2011-05-19Paper
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability2010-08-24Paper
Hedged Public-Key Encryption: How to Protect against Bad Randomness2009-12-15Paper
Distributed Discovery of Large Near-Cliques2009-11-19Paper
Weak Verifiable Random Functions2009-03-03Paper
General perfectly periodic scheduling2006-08-11Paper
Dispatching in perfectly-periodic schedules2004-03-14Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Zvika Brakerski