Adam O'Neill

Orcid: 0009-0006-0233-6466

According to our database1, Adam O'Neill authored at least 51 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Non-Interactive Verifiable Aggregation.
IACR Cryptol. ePrint Arch., 2025

Access-Controlled Inner Product Function-Revealing Encryption.
IACR Commun. Cryptol., 2025

Schnorr Signatures are Tightly Secure in the ROM Under a Non-interactive Assumption.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption.
IACR Cryptol. ePrint Arch., 2024

On the Black-Box Complexity of Private-Key Inner-Product Functional Encryption.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Breaking RSA Generically Is Equivalent to Factoring, with Preprocessing.
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024

2023
Forward Security Under Leakage Resilience, Revisited.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
Breaking RSA Generically is Equivalent to Factoring, with Preprocessing.
IACR Cryptol. ePrint Arch., 2022

Beyond Uber: Instantiating Generic Groups via PGGs.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Approximate Distance-Comparison-Preserving Symmetric Encryption.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Instantiability of Classical Random-Oracle-Model Encryption Transforms.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
On Selective-Opening Security of Deterministic Primitives.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

εpsolute: Efficiently Querying Databases While Providing Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Forward-Security Under Continual Leakage with Deterministic Key Updates.
IACR Cryptol. ePrint Arch., 2020

Toward RSA-OAEP Without Random Oracles.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Ad Hoc Multi-Input Functional Encryption.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

2019
Leakage Resilience from Program Obfuscation.
J. Cryptol., 2019

2018
Receiver- and sender-deniable functional encryption.
IET Inf. Secur., 2018

Towards RSA-OAEP without Random Oracles.
IACR Cryptol. ePrint Arch., 2018

A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Parameter-Hiding Order Revealing Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Privacy-preserving Network Provenance.
Proc. VLDB Endow., 2017

Accessing Data while Preserving Privacy.
CoRR, 2017

Forward-Security Under Continual Leakage.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Reducing the Leakage in Practical Order-Revealing Encryption.
IACR Cryptol. ePrint Arch., 2016

Leakage-Resilient Public-Key Encryption from Obfuscation.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Deniable Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Generic Attacks on Secure Outsourced Databases.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Selective-Opening Security in the Presence of Randomness Failures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Multi-input Functional Encryption with Unbounded-Message Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Modular Order-Preserving Encryption, Revisited.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

2014
Enhanced Chosen-Ciphertext Security and Applications.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

2013
Regularity of Lossy RSA on Subdomains and Its Applications.
Proceedings of the Advances in Cryptology, 2013

On the Achievability of Simulation-Based Security for Functional Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Dual Form Signatures: An Approach for Proving Security from Static Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Correlated-Input Secure Hash Functions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Bi-Deniable Public-Key Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
Stronger security notions for trapdoor functions and applications.
PhD thesis, 2010

Definitional Issues in Functional Encryption.
IACR Cryptol. ePrint Arch., 2010

Adaptive Trapdoor Functions and Chosen-Ciphertext Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Instantiability of RSA-OAEP under Chosen-Plaintext Attack.
Proceedings of the Advances in Cryptology, 2010

2009
Order-Preserving Symmetric Encryption.
Proceedings of the Advances in Cryptology, 2009

2008
New Multiparty Signature Schemes for Network Routing Applications.
ACM Trans. Inf. Syst. Secur., 2008

On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
Proceedings of the Advances in Cryptology, 2008

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
Proceedings of the Advances in Cryptology, 2008

2007
Provably-Secure Schemes for Basic Query Support in Outsourced Databases.
Proceedings of the Data and Applications Security XXI, 2007

Deterministic and Efficiently Searchable Encryption.
Proceedings of the Advances in Cryptology, 2007

Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007


  Loading...