Nir Bitansky

From MaRDI portal
(Redirected from Person:744604)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Reusable online-efficient commitments2024-12-13Paper
Robust additive randomized encodings from IO and pseudo-non-linear codes2024-12-13Paper
Amplification of non-interactive zero knowledge, revisited2024-12-13Paper
Bootstrapping homomorphic encryption via functional encryption2024-09-25Paper
Non-interactive universal arguments
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
PPAD is as hard as LWE and iterated squaring
Theory of Cryptography
2023-08-14Paper
Statistically sender-private OT from LPN and derandomization
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Constructive post-quantum reductions
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Post-quantum resettably-sound zero knowledge2023-03-31Paper
Classical binding for quantum commitments2023-03-31Paper
scientific article; zbMATH DE number 7650354 (Why is no real title available?)2023-02-03Paper
scientific article; zbMATH DE number 7650378 (Why is no real title available?)2023-02-03Paper
Non-malleable commitments against quantum attacks2022-08-30Paper
A note on perfect correctness by derandomization
Journal of Cryptology
2022-06-16Paper
Succinct non-interactive arguments via linear interactive proofs
Journal of Cryptology
2022-05-10Paper
Weak Zero-Knowledge beyond the Black-Box Barrier
SIAM Journal on Computing
2022-02-08Paper
Characterizing deterministic-prover zero knowledge2021-12-01Paper
Weakly extractable one-way functions2021-12-01Paper
Structure versus hardness through the obfuscation lens
SIAM Journal on Computing
2021-02-08Paper
Post-quantum zero knowledge in constant rounds
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
2021-01-19Paper
On the complexity of collision resistant hash functions: new and old black-box separations2020-04-30Paper
From cryptomania to obfustopia through secret-key functional encryption
Journal of Cryptology
2020-04-28Paper
Verifiable random functions from non-interactive witness-indistinguishable proofs
Journal of Cryptology
2020-04-28Paper
On round optimal statistical zero knowledge arguments2020-03-09Paper
Distributional collision resistance beyond one-way functions
(available as arXiv preprint)
2020-02-04Paper
Weak zero-knowledge beyond the black-box barrier
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Multi-collision resistance: a paradigm for keyless hash functions
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
Indistinguishability obfuscation from functional encryption
Journal of the ACM
2019-02-25Paper
One-message zero knowledge and non-malleable commitments2018-12-11Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
SIAM Journal on Computing
2018-07-04Paper
The hunting of the SNARK
Journal of Cryptology
2018-02-15Paper
Verifiable random functions from non-interactive witness-indistinguishable proofs
Theory of Cryptography
2018-01-19Paper
On virtual grey box obfuscation for general circuits
Algorithmica
2018-01-05Paper
Structure vs. hardness through the obfuscation lens2017-11-03Paper
On Removing Graded Encodings from Functional Encryption
Lecture Notes in Computer Science
2017-06-13Paper
A note on perfect correctness by derandomization
Lecture Notes in Computer Science
2017-06-13Paper
From cryptomania to obfustopia through secret-key functional encryption
Theory of Cryptography
2016-12-22Paper
3-message zero knowledge against human ignorance
Theory of Cryptography
2016-12-21Paper
On the existence of extractable one-way functions
SIAM Journal on Computing
2016-10-28Paper
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
2016-10-07Paper
Time-lock puzzles from randomized encodings
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Indistinguishability obfuscation: from approximate to exact
Theory of Cryptography
2016-03-23Paper
Perfect structure on the edge of chaos. Trapdoor permutations from indistinguishability obfuscation
Theory of Cryptography
2016-03-23Paper
On non-black-box simulation and the impossibility of approximate obfuscation
SIAM Journal on Computing
2015-11-04Paper
Succinct randomized encodings and their applications
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
ZAPs and non-interactive witness indistinguishability from indistinguishability obfuscation
Theory of Cryptography
2015-07-06Paper
On the existence of extractable one-way functions
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
On strong simulation and composable point obfuscation
Journal of Cryptology
2014-09-25Paper
On virtual grey box obfuscation for general circuits
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On the impossibility of approximate obfuscation and applications to resettable cryptography
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
The impossibility of obfuscation with auxiliary input or a universal simulator
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Recursive composition and bootstrapping for SNARKs and proof-carrying data
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Leakage-tolerant computation with input-independent preprocessing
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Obfuscation for evasive functions
Theory of Cryptography
2014-02-18Paper
Succinct non-interactive arguments via linear interactive proofs
Theory of Cryptography
2013-03-18Paper
Why ``Fiat-Shamir for proofs lacks a proof
Theory of Cryptography
2013-03-18Paper
Succinct arguments from multi-prover interactive proofs and their efficiency benefits
Lecture Notes in Computer Science
2012-09-25Paper
Leakage-Tolerant Interactive Protocols
Theory of Cryptography
2012-06-15Paper
Point obfuscation and 3-round zero-knowledge
Theory of Cryptography
2012-06-15Paper
Program obfuscation with leaky hardware
Lecture Notes in Computer Science
2011-12-02Paper
On strong simulation and composable point obfuscation
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper


Research outcomes over time


This page was built for person: Nir Bitansky