Ron D. Rothblum

From MaRDI portal
(Redirected from Person:776007)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient interactive proofs for non-deterministic bounded space2025-01-14Paper
Strong batching for non-interactive statistical zero-knowledge2024-11-13Paper
Combinatorially homomorphic encryption2024-08-02Paper
Delegation for search problems2024-06-24Paper
Collision Resistance from Multi-collision Resistance
Journal of Cryptology
2024-04-21Paper
scientific article; zbMATH DE number 7829262 (Why is no real title available?)2024-04-09Paper
scientific article; zbMATH DE number 7829299 (Why is no real title available?)2024-04-09Paper
Fiat–Shamir via list-recoverable codes (or: parallel repetition of GMW is not zero-knowledge)
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
2023-11-14Paper
PPAD is as hard as LWE and iterated squaring
Theory of Cryptography
2023-08-14Paper
Collision-resistance from multi-collision-resistance
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Succinct interactive oracle proofs: applications and limitations
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Faster sounder succinct arguments and \textsf{IOP}s
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
scientific article; zbMATH DE number 7650357 (Why is no real title available?)
(available as arXiv preprint)
2023-02-03Paper
Time- and space-efficient arguments from groups of unknown order2022-05-18Paper
How to Delegate Computations: The Power of No-Signaling Proofs
Journal of the ACM
2022-03-31Paper
Batch verification for statistical zero knowledge proofs2022-03-23Paper
Public-coin zero-knowledge arguments with (almost) minimal time and space overheads2022-03-23Paper
Batch verification and proofs of proximity with polylog overhead2022-03-23Paper
Public-coin statistical zero-knowledge batch verification against malicious verifiers2021-12-08Paper
Constant-round interactive proofs for delegating computation
SIAM Journal on Computing
2021-06-29Paper
Relaxed locally correctable codes2021-06-15Paper
Zero-knowledge proofs of proximity2021-06-15Paper
Toward non-interactive zero-knowledge proofs for NP from LWE
Journal of Cryptology
2021-04-07Paper
Relaxed locally correctable codes
Theory of Computing
2021-04-01Paper
scientific article; zbMATH DE number 7250162 (Why is no real title available?)2020-09-22Paper
From laconic zero-knowledge to public-key cryptography. Extended abstract2020-06-30Paper
On the (In)security of Kilian-based SNARGs2020-04-30Paper
Statistical difference beyond the polarizing regime2020-04-30Paper
New constructions of reusable designated-verifier NIZKs2020-03-09Paper
Reusable designated-verifier NIZKs for all NP from CDH2020-02-06Paper
Fiat-Shamir: from practice to theory
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Towards non-interactive zero-knowledge for NP from LWE2020-01-28Paper
Multi-collision resistant hash functions and their applications2018-07-09Paper
Fiat-Shamir and correlation intractability from strong KDM-secure encryption2018-07-09Paper
Proofs of proximity for context-free languages and read-once branching programs
Information and Computation
2018-06-14Paper
A hierarchy theorem for interactive proofs of proximity2018-05-03Paper
Non-interactive proofs of proximity
Computational Complexity
2018-04-18Paper
Distinguisher-dependent simulation in two rounds and its applications2017-11-15Paper
From obfuscation to the security of Fiat-Shamir for proofs2017-11-15Paper
Constant-round interactive proofs for delegating computation
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
Non-interactive proofs of proximity
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
2017-05-19Paper
Spooky Encryption and Its Applications
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Arguments of proximity (extended abstract)
Lecture Notes in Computer Science
2015-12-10Paper
Proofs of proximity for context-free languages and read-once branching programs
Automata, Languages, and Programming
2015-10-27Paper
How to delegate computations
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Delegation for bounded space
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Pseudorandom Graphs in Data Structures
Automata, Languages, and Programming
2014-07-01Paper
Fast pseudorandomness for independence and load balancing (extended abstract)
Automata, Languages, and Programming
2014-07-01Paper
Efficient multiparty protocols via log-depth threshold formulae. (Extended abstract)
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Enhancements of trapdoor permutations
Journal of Cryptology
2013-08-01Paper
On the circular security of bit-encryption
Theory of Cryptography
2013-03-18Paper
Homomorphic encryption: from private-key to public-key
Theory of Cryptography
2011-05-19Paper


Research outcomes over time


This page was built for person: Ron D. Rothblum