Nir Bitansky

From MaRDI portal
Person:744604

Available identifiers

zbMath Open bitansky.nirMaRDI QIDQ744604

List of research outcomes





PublicationDate of PublicationType
Reusable online-efficient commitments2024-12-13Paper
Robust additive randomized encodings from IO and pseudo-non-linear codes2024-12-13Paper
Amplification of non-interactive zero knowledge, revisited2024-12-13Paper
Bootstrapping homomorphic encryption via functional encryption2024-09-25Paper
Non-interactive universal arguments2024-02-02Paper
PPAD is as hard as LWE and iterated squaring2023-08-14Paper
Statistically sender-private OT from LPN and derandomization2023-06-30Paper
Constructive post-quantum reductions2023-06-30Paper
Post-quantum resettably-sound zero knowledge2023-03-31Paper
Classical binding for quantum commitments2023-03-31Paper
https://portal.mardi4nfdi.de/entity/Q58756992023-02-03Paper
https://portal.mardi4nfdi.de/entity/Q58757262023-02-03Paper
Non-malleable commitments against quantum attacks2022-08-30Paper
A note on perfect correctness by derandomization2022-06-16Paper
Succinct non-interactive arguments via linear interactive proofs2022-05-10Paper
Weak Zero-Knowledge beyond the Black-Box Barrier2022-02-08Paper
Characterizing deterministic-prover zero knowledge2021-12-01Paper
Weakly extractable one-way functions2021-12-01Paper
Structure versus hardness through the obfuscation lens2021-02-08Paper
Post-quantum zero knowledge in constant rounds2021-01-19Paper
On the complexity of collision resistant hash functions: new and old black-box separations2020-04-30Paper
From cryptomania to obfustopia through secret-key functional encryption2020-04-28Paper
Verifiable random functions from non-interactive witness-indistinguishable proofs2020-04-28Paper
On round optimal statistical zero knowledge arguments2020-03-09Paper
Distributional collision resistance beyond one-way functions2020-02-04Paper
Weak zero-knowledge beyond the black-box barrier2020-01-30Paper
Multi-collision resistance: a paradigm for keyless hash functions2019-08-22Paper
Indistinguishability obfuscation from functional encryption2019-02-25Paper
One-message zero knowledge and non-malleable commitments2018-12-11Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
The hunting of the SNARK2018-02-15Paper
Verifiable random functions from non-interactive witness-indistinguishable proofs2018-01-19Paper
On virtual grey box obfuscation for general circuits2018-01-05Paper
Structure vs. hardness through the obfuscation lens2017-11-03Paper
On Removing Graded Encodings from Functional Encryption2017-06-13Paper
A note on perfect correctness by derandomization2017-06-13Paper
From cryptomania to obfustopia through secret-key functional encryption2016-12-22Paper
3-message zero knowledge against human ignorance2016-12-21Paper
On the existence of extractable one-way functions2016-10-28Paper
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again2016-10-07Paper
Time-lock puzzles from randomized encodings2016-04-15Paper
Indistinguishability obfuscation: from approximate to exact2016-03-23Paper
Perfect structure on the edge of chaos. Trapdoor permutations from indistinguishability obfuscation2016-03-23Paper
On non-black-box simulation and the impossibility of approximate obfuscation2015-11-04Paper
Succinct randomized encodings and their applications2015-08-21Paper
ZAPs and non-interactive witness indistinguishability from indistinguishability obfuscation2015-07-06Paper
On the existence of extractable one-way functions2015-06-26Paper
On strong simulation and composable point obfuscation2014-09-25Paper
On virtual grey box obfuscation for general circuits2014-08-07Paper
On the impossibility of approximate obfuscation and applications to resettable cryptography2014-08-07Paper
The impossibility of obfuscation with auxiliary input or a universal simulator2014-08-07Paper
Recursive composition and bootstrapping for SNARKs and proof-carrying data2014-08-07Paper
Leakage-tolerant computation with input-independent preprocessing2014-08-07Paper
Obfuscation for evasive functions2014-02-18Paper
Succinct non-interactive arguments via linear interactive proofs2013-03-18Paper
Why ``Fiat-Shamir for proofs lacks a proof2013-03-18Paper
Succinct arguments from multi-prover interactive proofs and their efficiency benefits2012-09-25Paper
Leakage-Tolerant Interactive Protocols2012-06-15Paper
Point obfuscation and 3-round zero-knowledge2012-06-15Paper
Program obfuscation with leaky hardware2011-12-02Paper
On strong simulation and composable point obfuscation2010-08-24Paper

Research outcomes over time

This page was built for person: Nir Bitansky