Juan Garay

From MaRDI portal
Person:656917


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Towards permissionless consensus in the standard model via fine-grained complexity
 
2024-12-04Paper
Proof-of-work-based consensus in expected-constant time
 
2024-11-13Paper
Concurrent asynchronous Byzantine agreement in expected-constant rounds, revisited
 
2024-08-15Paper
Fast, long-lived renaming improved and simplified
 
2024-07-11Paper
Universally composable almost-everywhere secure computation
 
2024-06-25Paper
Completeness theorems for adaptively secure broadcast
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Permissionless clock synchronization with public setup
Theory of Cryptography
2023-08-14Paper
Adaptive Video on Demand
Lecture Notes in Computer Science
2023-05-08Paper
Resource-restricted cryptography: revisiting MPC bounds in the proof-of-work era
 
2022-03-23Paper
Broadcast-optimal two-round MPC
 
2022-03-23Paper
Blockchains from non-idealized hash functions
 
2021-12-01Paper
Round-preserving parallel composition of probabilistic-termination cryptographic protocols
Journal of Cryptology
2021-06-28Paper
SoK: a consensus taxonomy in the blockchain era
 
2020-08-05Paper
Consensus from signatures of work
 
2020-08-05Paper
Round-preserving parallel composition of probabilistic-termination cryptographic protocols
 
2020-05-27Paper
The combinatorics of hidden diversity
Theoretical Computer Science
2020-02-20Paper
Probabilistic termination and composability of cryptographic protocols
Journal of Cryptology
2019-08-13Paper
Perennial secure multi-party computation of universal Turing machine
Theoretical Computer Science
2019-04-23Paper
Fair distributed computation of reactive functions
 
2018-08-24Paper
But why does it work? A rational protocol design treatment of bitcoin
 
2018-07-09Paper
Bootstrapping the blockchain, with applications to consensus and fast PKI setup
 
2018-05-29Paper
The Bitcoin backbone protocol with chains of variable difficulty
 
2017-11-03Paper
The price of low communication in secure multi-party computation
 
2017-11-03Paper
Brief announcement: Secure self-stabilizing computation
Proceedings of the ACM Symposium on Principles of Distributed Computing
2017-10-11Paper
Long-lived renaming made fast
Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing - PODC '95
2017-09-29Paper
The hidden graph model: communication locality and optimal resiliency with adaptive faults
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
2017-05-19Paper
Secure Message Transmission With Small Public Discussion
IEEE Transactions on Information Theory
2017-05-16Paper
Resource-based corruptions and the combinatorics of hidden diversity
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Constant-round asynchronous multi-party computation based on one-way functions
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Probabilistic Termination and Composability of Cryptographic Protocols
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
On the implausibility of constant-round public-coin zero-knowledge proofs
Lecture Notes in Computer Science
2016-10-21Paper
How fair is your protocol? A utility-based approach to protocol optimality
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing
2016-03-23Paper
Almost-everywhere secure computation with edge corruptions
Journal of Cryptology
2016-01-11Paper
The Bitcoin Backbone Protocol: Analysis and Applications
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Broadcast (and round) efficient verifiable secret sharing
Lecture Notes in Computer Science
2015-09-30Paper
Adaptively secure broadcast, revisited
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
2015-09-11Paper
Distributed pseudo-random bit generators---a new way to speed-up shared coin tossing
Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing - PODC '96
2015-09-11Paper
Efficient player-optimal protocols for strong and differential consensus
Proceedings of the twenty-second annual symposium on Principles of distributed computing
2015-09-04Paper
Fast and unconditionally secure anonymous channel
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
Towards efficient private distributed computation on unbounded input streams
Journal of Mathematical Cryptology
2015-08-07Paper
A little honesty goes a long way. The two-tier model for secure multiparty computation
Theory of Cryptography
2015-07-06Paper
Fully polynomial Byzantine agreement in t + 1 rounds
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing - STOC '93
2015-05-07Paper
On the complexity of UC commitments
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Edge Fault Tolerance on Sparse Networks
Automata, Languages, and Programming
2012-11-01Paper
Resource fairness and composability of cryptographic protocols
Journal of Cryptology
2012-01-13Paper
Secure message transmission by public discussion: a brief survey
Lecture Notes in Computer Science
2011-06-08Paper
Timed release of standard digital signatures (extended abstract)
Financial Cryptography
2011-04-20Paper
Improved fault tolerance and secure computation on sparse networks
Automata, Languages and Programming
2010-09-07Paper
Secure message transmission with small public discussion
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Timed fair exchange of standard signatures (extended abstract)
Lecture Notes in Computer Science
2010-03-31Paper
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Almost-Everywhere Secure Computation
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Practical and Secure Solutions for Integer Comparison
Public Key Cryptography – PKC 2007
2007-09-04Paper
Towards Optimal and Efficient Perfectly Secure Message Transmission
Theory of Cryptography
2007-08-30Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Strengthening zero-knowledge protocols using signatures
Journal of Cryptology
2006-08-14Paper
Minimal complete primitives for secure multi-party computation
Journal of Cryptology
2005-05-13Paper
Mutual search
Journal of the ACM
2005-01-25Paper
scientific article; zbMATH DE number 2009955 (Why is no real title available?)
 
2003-11-26Paper
Sharing video on demand
Discrete Applied Mathematics
2003-07-30Paper
scientific article; zbMATH DE number 1848306 (Why is no real title available?)
 
2003-07-10Paper
scientific article; zbMATH DE number 1759788 (Why is no real title available?)
 
2002-10-07Paper
scientific article; zbMATH DE number 1418311 (Why is no real title available?)
 
2000-08-24Paper
Secure distributed storage and retrieval
Theoretical Computer Science
2000-08-21Paper
scientific article; zbMATH DE number 1303126 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1303590 (Why is no real title available?)
 
1999-06-17Paper
A SubLinear Time Distributed Algorithm for Minimum-Weight Spanning Trees
SIAM Journal on Computing
1998-05-10Paper
Fully Polynomial Byzantine Agreement for n > 3t Processors in t + 1 Rounds
SIAM Journal on Computing
1998-05-10Paper
Efficient On-Line Call Control Algorithms
Journal of Algorithms
1997-04-27Paper
Fast consensus in networks of bounded degree.
Distributed Computing
1995-11-22Paper
Optimal amortized distributed consensus
Information and Computation
1995-10-29Paper
Cloture Votes:n/4-resilient Distributed Consensus int + 1 rounds
Mathematical Systems Theory
1993-04-01Paper


Research outcomes over time


This page was built for person: Juan Garay