Publication | Date of Publication | Type |
---|
Zero‐Knowledge Proofs | 2023-08-04 | Paper |
Efficient proofs of knowledge for threshold relations | 2023-07-28 | Paper |
Efficient NIZK arguments with straight-line simulation and extraction | 2023-07-28 | Paper |
Doubly adaptive zero-knowledge proofs | 2023-07-21 | Paper |
Black-box constructions of bounded-concurrent secure computation | 2022-12-16 | Paper |
Shielded computations in smart contracts overcoming forks | 2022-06-17 | Paper |
Publicly verifiable zero knowledge from (collapsing) blockchains | 2021-12-21 | Paper |
How to extract useful randomness from unreliable sources | 2021-12-01 | Paper |
Continuously non-malleable codes in the split-state model from minimal assumptions | 2020-06-30 | Paper |
UC-secure multiparty computation from one-way functions using stateless tokens | 2020-05-05 | Paper |
Universally composable secure computation with corrupted tokens | 2020-03-09 | Paper |
Publicly verifiable proofs from blockchains | 2020-01-28 | Paper |
Non-interactive zero knowledge \textit{proofs} in the random oracle model | 2019-10-14 | Paper |
Non-interactive secure computation from one-way functions | 2019-01-23 | Paper |
Round-optimal secure two-party computation from trapdoor permutations | 2018-01-19 | Paper |
Delayed-input non-malleable zero knowledge and multi-party coin tossing in four rounds | 2018-01-19 | Paper |
Resettably-sound resettable zero knowledge in constant rounds | 2018-01-19 | Paper |
Four-round concurrent non-malleable commitments from one-way functions | 2017-11-15 | Paper |
Delayed-input cryptographic protocols | 2017-08-04 | Paper |
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs | 2017-06-13 | Paper |
Concurrent Non-Malleable Commitments (and More) in 3 Rounds | 2016-11-09 | Paper |
Online/Offline OR Composition of Sigma Protocols | 2016-07-15 | Paper |
A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles | 2016-04-08 | Paper |
Improved OR-Composition of Sigma-Protocols | 2016-04-08 | Paper |
Impossibility of Black-Box Simulation Against Leakage Attacks | 2015-12-10 | Paper |
Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World | 2015-09-30 | Paper |
Black-box non-black-box zero knowledge | 2015-06-26 | Paper |
On Selective-Opening Attacks against Encryption Schemes | 2014-10-14 | Paper |
On Input Indistinguishable Proof Systems | 2014-07-01 | Paper |
Statistical Concurrent Non-malleable Zero Knowledge | 2014-02-18 | Paper |
4-Round Resettably-Sound Zero Knowledge | 2014-02-18 | Paper |
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model | 2013-12-10 | Paper |
Nearly Simultaneously Resettable Black-Box Zero Knowledge | 2013-08-12 | Paper |
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions | 2013-05-31 | Paper |
On constant-round concurrent non-malleable proof systems | 2013-04-04 | Paper |
Concurrent Zero Knowledge in the Bounded Player Model | 2013-03-18 | Paper |
Revisiting Lower and Upper Bounds for Selective Decommitments | 2013-03-18 | Paper |
Secure Database Commitments and Universal Arguments of Quasi Knowledge | 2012-09-25 | Paper |
Impossibility Results for Static Input Secure Computation | 2012-09-25 | Paper |
On Round-Optimal Zero Knowledge in the Bare Public-Key Model | 2012-06-29 | Paper |
Resettable Statistical Zero Knowledge | 2012-06-15 | Paper |
Simultaneously Resettable Arguments of Knowledge | 2012-06-15 | Paper |
Secure Set Intersection with Untrusted Hardware Tokens | 2011-02-11 | Paper |
Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments | 2010-05-28 | Paper |
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge | 2010-02-24 | Paper |
Theoretical Computer Science | 2010-02-23 | Paper |
Collusion-Free Multiparty Computation in the Mediated Model | 2009-10-20 | Paper |
Co-sound Zero-Knowledge with Public Keys | 2009-07-07 | Paper |
Hybrid commitments and their applications to zero-knowledge proof systems | 2009-06-22 | Paper |
Simulation-Based Concurrent Non-malleable Commitments and Decommitments | 2009-03-03 | Paper |
Collusion-Free Protocols in the Mediated Model | 2009-02-10 | Paper |
Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model | 2008-08-19 | Paper |
Impossibility and Feasibility Results for Zero Knowledge with Public Keys | 2008-03-17 | Paper |
Completely Non-malleable Encryption Revisited | 2008-03-05 | Paper |
Efficient Zero Knowledge on the Internet | 2007-09-11 | Paper |
On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model | 2007-09-05 | Paper |
Theory of Cryptography | 2007-02-12 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge | 2005-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450730 | 2004-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414283 | 2003-07-24 | Paper |