Ran Canetti

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Circuit complexity and functionality: a statistical thermodynamics perspective
Proceedings of the National Academy of Sciences of the United States of America
2026-03-13Paper
On the computational hardness needed for quantum cryptography2024-09-25Paper
Taming adaptivity in YOSO protocols: the modular way2024-08-02Paper
Triply adaptive UC NIZK
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Covert learning: how to learn with an untrusted intermediary2023-04-13Paper
Fully deniable interactive encryption2022-11-09Paper
COA-secure obfuscation and applications2022-08-30Paper
Unclonable polymers and their cryptographic applications2022-08-30Paper
Universally composable security
Journal of the ACM
2022-03-31Paper
Universal composition with global subroutines: capturing global setup within plain UC2022-03-23Paper
Towards multiparty computation withstanding coercion of all parties2022-03-23Paper
Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model
SIAM Journal on Computing
2022-02-08Paper
Universally composable accumulators2020-08-05Paper
Fiat-Shamir: from practice to theory
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Certifying trapdoor permutations, revisited2018-12-11Paper
Fiat-Shamir and correlation intractability from strong KDM-secure encryption2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
SIAM Journal on Computing
2018-07-04Paper
Task-structured probabilistic I/O automata
Journal of Computer and System Sciences
2018-04-18Paper
Optimal-rate non-committing encryption2018-02-23Paper
The hunting of the SNARK
Journal of Cryptology
2018-02-15Paper
Towards doubly efficient private information retrieval2018-01-19Paper
On virtual grey box obfuscation for general circuits
Algorithmica
2018-01-05Paper
Maintaining authenticated communication in the presence of break-ins
Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97
2017-09-29Paper
Randomness vs. fault-tolerance
Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97
2017-09-29Paper
Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing
2017-08-17Paper
Better two-round adaptive multi-party computation
Lecture Notes in Computer Science
2017-06-13Paper
Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
Lecture Notes in Computer Science
2017-06-13Paper
Chosen-Ciphertext Secure Fully Homomorphic Encryption
Lecture Notes in Computer Science
2017-06-13Paper
Adaptive succinct garbled RAM or: how to delegate your database
Theory of Cryptography
2016-12-22Paper
On the existence of extractable one-way functions
SIAM Journal on Computing
2016-10-28Paper
Toward a game theoretic view of secure computation
Journal of Cryptology
2016-10-13Paper
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
2016-10-07Paper
Secure computation with honest-looking parties: what if nobody is truly honest? (extended abstract)
Proceedings of the thirty-first annual ACM symposium on Theory of Computing
2016-09-29Paper
Adaptive hardness and composable security in the plain model from standard assumptions
SIAM Journal on Computing
2016-09-23Paper
Reusable fuzzy extractors for low-entropy distributions
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Fully succinct garbled RAM
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Universally Composable Authentication and Key-Exchange with Global PKI
Public-Key Cryptography – PKC 2016
2016-04-13Paper
On the correlation intractability of obfuscated pseudorandom functions
Theory of Cryptography
2016-03-23Paper
Selective private function evaluation with applications to private statistics
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
2016-03-04Paper
Concurrent secure computation with optimal query complexity
Lecture Notes in Computer Science
2015-12-10Paper
A simpler variant of universally composable security for standard multiparty computation
Lecture Notes in Computer Science
2015-12-10Paper
Keying hash functions for message authentication
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Succinct garbling and indistinguishability obfuscation for RAM programs
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
Theory of Cryptography
2015-07-06Paper
Obfuscation of probabilistic circuits and applications
Theory of Cryptography
2015-07-06Paper
On obfuscation with random oracles
Theory of Cryptography
2015-07-06Paper
On the existence of extractable one-way functions
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Asynchronous secure computation
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing - STOC '93
2015-05-07Paper
Fast asynchronous Byzantine agreement with optimal resilience
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing - STOC '93
2015-05-07Paper
Black-box concurrent zero-knowledge requires \(\tilde{\omega}(\log n)\) rounds
Proceedings of the thirty-third annual ACM symposium on Theory of computing
2015-02-27Paper
Secure Key Exchange and Sessions without Credentials
Lecture Notes in Computer Science
2014-10-14Paper
Resettable zero-knowledge (extended abstract)
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
On strong simulation and composable point obfuscation
Journal of Cryptology
2014-09-25Paper
Client-server concurrent zero knowledge with constant rounds and guaranteed complexity
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
On virtual grey box obfuscation for general circuits
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
The impossibility of obfuscation with auxiliary input or a universal simulator
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Recursive composition and bootstrapping for SNARKs and proof-carrying data
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Verifiable set operations over outsourced databases
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Obfuscation for evasive functions
Theory of Cryptography
2014-02-18Paper
Refereed delegation of computation
Information and Computation
2013-12-03Paper
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model
Theory of Cryptography
2013-03-18Paper
Two protocols for delegation of computation
Lecture Notes in Computer Science
2012-11-06Paper
Universally composable security with local adversaries
Lecture Notes in Computer Science
2012-09-25Paper
Efficient password authenticated key exchange via oblivious transfer
Public Key Cryptography – PKC 2012
2012-07-20Paper
Leakage-Tolerant Interactive Protocols
Theory of Cryptography
2012-06-15Paper
Secure computation without authentication
Journal of Cryptology
2012-01-13Paper
Program obfuscation with leaky hardware
Lecture Notes in Computer Science
2011-12-02Paper
Towards a game theoretic view of secure computation
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Universally composable symbolic security analysis
Journal of Cryptology
2011-04-01Paper
The random oracle methodology, revisited.
Journal of the ACM
2011-02-01Paper
On strong simulation and composable point obfuscation
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Universally composable two-party and multi-party secure computation
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
2010-08-05Paper
On symmetric encryption and point obfuscation
Theory of Cryptography
2010-02-24Paper
Obfuscation of hyperplane membership
Theory of Cryptography
2010-02-24Paper
Analyzing security protocols using time-bounded task-PIOAs
Discrete Event Dynamic Systems
2009-05-29Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Amplifying Collision Resistance: A Complexity-Theoretic Treatment
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Towards a Theory of Extractable Functions
Theory of Cryptography
2009-03-03Paper
Non-malleable Obfuscation
Theory of Cryptography
2009-03-03Paper
Just fast keying
ACM Transactions on Information and System Security
2008-12-21Paper
Modeling Computational Security in Long-Lived Systems
CONCUR 2008 - Concurrency Theory
2008-11-25Paper
Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols
Lecture Notes in Computer Science
2008-09-09Paper
Extractable Perfectly One-Way Functions
Automata, Languages and Programming
2008-08-19Paper
How to Protect Yourself without Perfect Shredding
Automata, Languages and Programming
2008-08-19Paper
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Universally Composable Password-Based Key Exchange
Lecture Notes in Computer Science
2008-05-06Paper
Obfuscating Point Functions with Multibit Output
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Secure Computation Without Authentication
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Chosen‐Ciphertext Security from Identity‐Based Encryption
SIAM Journal on Computing
2007-10-22Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Mitigating Dictionary Attacks on Password-Protected Local Storage
Lecture Notes in Computer Science
2007-09-04Paper
Universally Composable Security with Global Setup
Theory of Cryptography
2007-08-30Paper
A forward-secure public-key encryption scheme
Journal of Cryptology
2007-08-20Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
On the limitations of universally composable two-party computation without set-up assumptions
Journal of Cryptology
2006-08-14Paper
Exposure-resilient functions and all-or-nothing transforms2006-03-01Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Adaptive versus non-adaptive security of multi-party protocols
Journal of Cryptology
2004-10-01Paper
scientific article; zbMATH DE number 2086716 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2009960 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 2009949 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1962757 (Why is no real title available?)2003-08-11Paper
scientific article; zbMATH DE number 1947510 (Why is no real title available?)2003-07-09Paper
scientific article; zbMATH DE number 1942418 (Why is no real title available?)2003-06-30Paper
Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds
SIAM Journal on Computing
2003-01-05Paper
scientific article; zbMATH DE number 1842484 (Why is no real title available?)2002-12-08Paper
On the statistical properties of Diffie-Hellman distributions
Israel Journal of Mathematics
2002-11-12Paper
scientific article; zbMATH DE number 1775406 (Why is no real title available?)2002-09-24Paper
scientific article; zbMATH DE number 1775427 (Why is no real title available?)2002-08-01Paper
scientific article; zbMATH DE number 1775397 (Why is no real title available?)2002-08-01Paper
scientific article; zbMATH DE number 1722683 (Why is no real title available?)2002-03-21Paper
scientific article; zbMATH DE number 1722690 (Why is no real title available?)2002-03-21Paper
scientific article; zbMATH DE number 1263237 (Why is no real title available?)2002-02-03Paper
scientific article; zbMATH DE number 1263238 (Why is no real title available?)2002-02-03Paper
Security and composition of multiparty cryptographic protocols
Journal of Cryptology
2000-11-27Paper
scientific article; zbMATH DE number 1418290 (Why is no real title available?)2000-07-19Paper
Randomness versus fault-tolerance
Journal of Cryptology
2000-05-08Paper
Maintaining authenticated communication in the presence of break-ins
Journal of Cryptology
2000-05-08Paper
scientific article; zbMATH DE number 1406798 (Why is no real title available?)2000-03-01Paper
Bandwidth Allocation with Preemption
SIAM Journal on Computing
1999-10-28Paper
An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
Advances in Cryptology — EUROCRYPT ’99
1999-10-05Paper
scientific article; zbMATH DE number 1304090 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1256784 (Why is no real title available?)1999-03-01Paper
Bounding the Power of Preemption in Randomized Scheduling
SIAM Journal on Computing
1998-09-20Paper
scientific article; zbMATH DE number 1088253 (Why is no real title available?)1998-03-17Paper
scientific article; zbMATH DE number 1088228 (Why is no real title available?)1997-11-17Paper
On Certain Exponential Sums and the Distribution of Diffie-Hellman Triples
Journal of the London Mathematical Society
1997-09-15Paper
Lower bounds for sampling algorithms for estimating the average
Information Processing Letters
1997-02-28Paper
More on BPP and the polynomial-time hierarchy
Information Processing Letters
1997-02-27Paper
Bounds on tradeoffs between randomness and communication complexity
Computational Complexity
1993-10-18Paper


Research outcomes over time


This page was built for person: Ran Canetti