Ron D. Rothblum

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient interactive proofs for non-deterministic bounded space2025-01-14Paper
Strong batching for non-interactive statistical zero-knowledge2024-11-13Paper
Combinatorially homomorphic encryption2024-08-02Paper
Delegation for search problems2024-06-24Paper
Collision Resistance from Multi-collision Resistance
Journal of Cryptology
2024-04-21Paper
scientific article; zbMATH DE number 7829262 (Why is no real title available?)2024-04-09Paper
scientific article; zbMATH DE number 7829299 (Why is no real title available?)2024-04-09Paper
Fiat–Shamir via list-recoverable codes (or: parallel repetition of GMW is not zero-knowledge)
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
2023-11-14Paper
PPAD is as hard as LWE and iterated squaring
Theory of Cryptography
2023-08-14Paper
Collision-resistance from multi-collision-resistance
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Succinct interactive oracle proofs: applications and limitations
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Faster sounder succinct arguments and \textsf{IOP}s
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
scientific article; zbMATH DE number 7650357 (Why is no real title available?)
(available as arXiv preprint)
2023-02-03Paper
Time- and space-efficient arguments from groups of unknown order2022-05-18Paper
How to Delegate Computations: The Power of No-Signaling Proofs
Journal of the ACM
2022-03-31Paper
Batch verification for statistical zero knowledge proofs2022-03-23Paper
Public-coin zero-knowledge arguments with (almost) minimal time and space overheads2022-03-23Paper
Batch verification and proofs of proximity with polylog overhead2022-03-23Paper
Public-coin statistical zero-knowledge batch verification against malicious verifiers2021-12-08Paper
Constant-round interactive proofs for delegating computation
SIAM Journal on Computing
2021-06-29Paper
Relaxed locally correctable codes2021-06-15Paper
Zero-knowledge proofs of proximity2021-06-15Paper
Toward non-interactive zero-knowledge proofs for NP from LWE
Journal of Cryptology
2021-04-07Paper
Relaxed locally correctable codes
Theory of Computing
2021-04-01Paper
scientific article; zbMATH DE number 7250162 (Why is no real title available?)2020-09-22Paper
From laconic zero-knowledge to public-key cryptography. Extended abstract2020-06-30Paper
On the (In)security of Kilian-based SNARGs2020-04-30Paper
Statistical difference beyond the polarizing regime2020-04-30Paper
New constructions of reusable designated-verifier NIZKs2020-03-09Paper
Reusable designated-verifier NIZKs for all NP from CDH2020-02-06Paper
Fiat-Shamir: from practice to theory
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Towards non-interactive zero-knowledge for NP from LWE2020-01-28Paper
Multi-collision resistant hash functions and their applications2018-07-09Paper
Fiat-Shamir and correlation intractability from strong KDM-secure encryption2018-07-09Paper
Proofs of proximity for context-free languages and read-once branching programs
Information and Computation
2018-06-14Paper
A hierarchy theorem for interactive proofs of proximity2018-05-03Paper
Non-interactive proofs of proximity
Computational Complexity
2018-04-18Paper
Distinguisher-dependent simulation in two rounds and its applications2017-11-15Paper
From obfuscation to the security of Fiat-Shamir for proofs2017-11-15Paper
Constant-round interactive proofs for delegating computation
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
Non-interactive proofs of proximity
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
2017-05-19Paper
Spooky Encryption and Its Applications
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Arguments of proximity (extended abstract)
Lecture Notes in Computer Science
2015-12-10Paper
Proofs of proximity for context-free languages and read-once branching programs
Automata, Languages, and Programming
2015-10-27Paper
How to delegate computations
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Delegation for bounded space
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Pseudorandom Graphs in Data Structures
Automata, Languages, and Programming
2014-07-01Paper
Fast pseudorandomness for independence and load balancing (extended abstract)
Automata, Languages, and Programming
2014-07-01Paper
Efficient multiparty protocols via log-depth threshold formulae. (Extended abstract)
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Enhancements of trapdoor permutations
Journal of Cryptology
2013-08-01Paper
On the circular security of bit-encryption
Theory of Cryptography
2013-03-18Paper
Homomorphic encryption: from private-key to public-key
Theory of Cryptography
2011-05-19Paper


Research outcomes over time


This page was built for person: Ron D. Rothblum