Zvika Brakerski

From MaRDI portal
Person:514474

Available identifiers

zbMath Open brakerski.zvikaMaRDI QIDQ514474

List of research outcomes





PublicationDate of PublicationType
On algebraic embedding for unstructured lattices2024-11-12Paper
On the computational hardness needed for quantum cryptography2024-09-25Paper
Pseudorandomness with proof of destruction and applications2024-08-15Paper
Factoring and pairings are not necessary for iO: circular-secure LWE suffices2024-06-24Paper
Lattice problems beyond polynomial time2024-05-08Paper
https://portal.mardi4nfdi.de/entity/Q61262542024-04-09Paper
Black-hole radiation decoding is quantum cryptography2024-02-06Paper
Simple tests of quantumness also certify qubits2024-02-06Paper
SNARGs for monotone policy batch NP2024-02-02Paper
Quantum garbled circuits2023-12-08Paper
https://portal.mardi4nfdi.de/entity/Q60909042023-11-20Paper
Candidate iO from homomorphic encryption schemes2023-07-26Paper
Constructive post-quantum reductions2023-06-30Paper
Classical binding for quantum commitments2023-03-31Paper
https://portal.mardi4nfdi.de/entity/Q58743922023-02-07Paper
https://portal.mardi4nfdi.de/entity/Q58757782023-02-03Paper
A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device2022-12-08Paper
NIZK from LPN and trapdoor hash via correlation intractability for approximable relations2022-12-07Paper
Scalable pseudorandom quantum states2022-11-09Paper
Batch-OT with optimal rate2022-08-30Paper
Impossibility of quantum virtual black-box obfuscation of classical circuits2022-03-31Paper
Hardness of LWE on general entropic distributions2022-03-23Paper
Constant ciphertext-rate non-committing encryption from standard assumptions2021-12-01Paper
Witness indistinguishability for any single-round argument with applications to access control2021-12-01Paper
Candidate iO from homomorphic encryption schemes2021-12-01Paper
Lossiness and entropic hardness for ring-LWE2021-12-01Paper
FHE-based bootstrapping of designated-prover NIZK2021-12-01Paper
Brief announcement: Zero-knowledge protocols for search problems2021-07-28Paper
Obfuscating circuits via composite-order graded encoding2021-07-02Paper
Perfect secure computation in two rounds2021-02-08Paper
Quantum FHE (almost) as secure as classical2020-06-30Paper
Order-LWE and the hardness of ring-LWE with entropic secrets2020-05-05Paper
(Pseudo) random quantum states with binary phase2020-04-30Paper
Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles2020-04-30Paper
Degree 2 is complete for the round-complexity of malicious MPC2020-02-06Paper
Worst-case hardness for LPN and cryptographic hashing via code smoothing2020-02-04Paper
On quantum advantage in information theoretic single-server PIR2020-02-04Paper
Fast algorithms for interactive coding2019-05-15Paper
Perfect secure computation in two rounds2018-12-11Paper
Two-message statistically sender-private OT from LWE2018-12-06Paper
Non-trivial witness encryption and null-iO from standard assumptions2018-10-17Paper
Zero-knowledge protocols for search problems2018-10-17Paper
Limits on low-degree pseudorandom generators (or: sum-of-squares meets program obfuscation)2018-07-09Paper
Anonymous IBE, leakage resilience and circular security from new assumptions2018-07-09Paper
Learning with errors and extrapolated dihedral cosets2018-05-29Paper
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions2018-05-28Paper
https://portal.mardi4nfdi.de/entity/Q46380572018-05-03Paper
Function-private functional encryption in the private-key setting2018-04-26Paper
Succinct spooky free compilers are not black box sound2018-02-23Paper
Private constrained PRFs (and more) from LWE2018-01-19Paper
Four round secure computation without setup2018-01-19Paper
Non-interactive delegation and batch NP verification from standard computational assumptions2017-08-17Paper
FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime2017-06-13Paper
Black-box obfuscation for \(d\)-CNFs2017-05-19Paper
Lattice-based FHE as secure as PKE2017-05-19Paper
Obfuscating conjunctions2017-03-02Paper
Targeted homomorphic attribute-based encryption2016-12-22Paper
3-message zero knowledge against human ignorance2016-12-21Paper
Lattice-based fully dynamic multi-key FHE with short ciphertexts2016-11-30Paper
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security2016-11-09Paper
On statistically secure obfuscation with approximate correctness2016-10-27Paper
(Leveled) fully homomorphic encryption without bootstrapping2016-10-24Paper
Shorter circuit obfuscation in challenging security models2016-10-21Paper
(Leveled) fully homomorphic encryption without bootstrapping2016-10-07Paper
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions2016-07-15Paper
Obfuscating conjunctions under entropic ring LWE2016-04-15Paper
From selective to adaptive security in functional encryption2015-12-10Paper
Fast interactive coding against adversarial noise2015-08-14Paper
Function-private functional encryption in the private-key setting2015-07-06Paper
Obfuscating circuits via composite-order graded encoding2015-07-06Paper
Constrained key-homomorphic PRFs from standard lattice assumptions. Or: how to secretly embed a circuit in your PRF2015-07-06Paper
Better security for deterministic public-key encryption: the auxiliary-input setting2014-09-25Paper
Classical hardness of learning with errors2014-08-07Paper
Efficient Fully Homomorphic Encryption from (Standard) LWE2014-07-30Paper
Efficient fully homomorphic encryption from (standard) LWE2014-07-30Paper
General perfectly periodic scheduling2014-07-25Paper
(Leveled) fully homomorphic encryption without bootstrapping2014-07-01Paper
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding2014-02-18Paper
Obfuscating conjunctions2013-09-17Paper
Packed ciphertexts in LWE-based homomorphic encryption2013-04-19Paper
When Homomorphism Becomes a Liability2013-03-18Paper
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP2012-09-25Paper
A parallel repetition theorem for leakage resilience2012-06-15Paper
Distributed discovery of large near-cliques2012-02-06Paper
From absolute distinguishability to positive distinguishability2011-08-19Paper
Fully homomorphic encryption from ring-LWE and security for key dependent messages2011-08-12Paper
Better security for deterministic public-key encryption: the auxiliary-input setting2011-08-12Paper
Black-box circular-secure encryption beyond affine functions2011-05-19Paper
Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions2011-05-19Paper
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability2010-08-24Paper
Hedged public-key encryption: how to protect against bad randomness2009-12-15Paper
Distributed Discovery of Large Near-Cliques2009-11-19Paper
Weak Verifiable Random Functions2009-03-03Paper
General perfectly periodic scheduling2006-08-11Paper
Dispatching in perfectly-periodic schedules2004-03-14Paper

Research outcomes over time

This page was built for person: Zvika Brakerski