Ilan Komargodski

Orcid: 0000-0002-1647-2112

Affiliations:
  • The Hebrew University of Jerusalem, Israel


According to our database1, Ilan Komargodski authored at least 86 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Proof of Work With External Utilities.
CoRR, May, 2025

Proofs of Useful Work from Arbitrary Matrix Multiplication.
IACR Cryptol. ePrint Arch., 2025

Reusable Designated Verifier NIZK from Lossy Trapdoor Functions.
IACR Cryptol. ePrint Arch., 2025

MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAM.
IACR Cryptol. ePrint Arch., 2025

A New Approach for LPN-Based Pseudorandom Functions: Low-Depth and Key-Homomorphic.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

The Complexity of Memory Checking with Covert Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Offline-Online Indifferentiability of Cryptographic Systems.
IACR Cryptol. ePrint Arch., 2024

On the (Im)possibility of Game-Theoretically Fair Leader Election Protocols.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Optimal Load-Balanced Scalable Distributed Agreement.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

Memory Checking Requires Logarithmic Overhead.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

Scalable Agreement Protocols with Optimal Optimistic Efficiency.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Scalable Distributed Agreement from LWE: Byzantine Agreement, Broadcast, and Leader Election.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Verifying Groups in Linear Time.
Proceedings of the 65th IEEE Annual Symposium on Foundations of Computer Science, 2024

2023
Decentralized Multi-authority ABE for sfNC<sup>1</sup> from BDH.
J. Cryptol., April, 2023

Brief Announcement: Scalable Agreement Protocols with Optimal Optimistic Efficiency.
Proceedings of the 37th International Symposium on Distributed Computing, 2023

3-Party Secure Computation for RAMs: Optimal and Concretely Efficient.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Distributed-Prover Interactive Proofs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Maliciously-Secure MrNISC in the Plain Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Fully Adaptive Decentralized Multi-Authority ABE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

On Distributed Randomness Generation in Blockchains.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing Scheme.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

The Cost of Statistical Security in Proofs for Repeated Squaring.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
log*-Round Game-Theoretically-Fair Leader Election.
IACR Cryptol. ePrint Arch., 2022

The Cost of Statistical Security in Interactive Proofs for Repeated Squaring.
IACR Cryptol. ePrint Arch., 2022

Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS.
IACR Cryptol. ePrint Arch., 2022

Optimal Oblivious Parallel RAM.
Proceedings of the 2022 ACM-SIAM Symposium on Discrete Algorithms, 2022

log <sup>*</sup>-Round Game-Theoretically-Fair Leader Election.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Maliciously Secure Massively Parallel Computation for All-but-One Corruptions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Decentralized Multi-Authority ABE for NC^1 from Computational-BDH.
IACR Cryptol. ePrint Arch., 2021

Non-malleable Time-Lock Puzzles and Applications.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Differentially Oblivious Turing Machines.
Proceedings of the 12th Innovations in Theoretical Computer Science Conference, 2021

Decentralized Multi-authority ABE for DNFs from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Multiparty Reusable Non-interactive Secure Computation from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

A Logarithmic Lower Bound for Oblivious RAM (for All Parameters).
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Non-malleable Codes for Bounded Parallel-Time Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Oblivious RAM with Worst-Case Logarithmic Overhead.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Lower Bound for Oblivious RAM with Large Cells.
IACR Cryptol. ePrint Arch., 2020

Non-Malleable Codes for Bounded Polynomial Depth Tampering.
IACR Cryptol. ePrint Arch., 2020

Secure Massively Parallel Computation for Dishonest Majority.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Impossibility of Strong KDM Security with Auxiliary Input.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Instance Complexity and Unlabeled Certificates in the Decision Tree Model.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

Oblivious Parallel Tight Compaction.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

Continuous Verifiable Delay Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

SPARKs: Succinct Parallelizable Arguments of Knowledge.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

OptORAMa: Optimal Oblivious RAM.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
On Perfect Correctness without Derandomization.
IACR Cryptol. ePrint Arch., 2019

Distributional Collision Resistance Beyond One-Way Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
OptORAMa: Optimal Oblivious RAM.
IACR Cryptol. ePrint Arch., 2018

A Lower Bound for Adaptively-Secure Collective Coin-Flipping Protocols.
Proceedings of the 32nd International Symposium on Distributed Computing, 2018

Non-trivial Witness Encryption and Null-iO from Standard Assumptions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Another Step Towards Realizing Random Oracles: Non-malleable Point Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation).
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

On Distributional Collision Resistant Hashing.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

On the Complexity of Compressing Obfuscation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Improved Average-Case Lower Bounds for De Morgan Formula Size: Matching Worst-Case Lower Bound.
SIAM J. Comput., 2017

Evolving Secret Sharing: Dynamic Thresholds and Robustness.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017

From Minicrypt to Obfustopia via Private-Key Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Be Adaptive, Avoid Overcommitting.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Non-Interactive Multiparty Computation Without Correlated Randomness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Cutting-Edge Cryptography Through the Lens of Secret Sharing.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

How to Share a Secret, Infinitely.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Leakage Resilient One-Way Functions: The Auxiliary-Input Setting.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Threshold Secret Sharing Requires a Linear Size Alphabet.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Communication with Contextual Uncertainty.
Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 2016

Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Modern Cryptography Through the Lens of Secret Sharing.
IACR Cryptol. ePrint Arch., 2015

From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting.
IACR Cryptol. ePrint Arch., 2015

Communication with Contextual Uncertainty.
Electron. Colloquium Comput. Complex., 2015

Compressing Communication in Distributed Protocols.
Proceedings of the Distributed Computing - 29th International Symposium, 2015

Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Strong Locally Testable Codes with Relaxed Local Decoders.
Proceedings of the 30th Conference on Computational Complexity, 2015

Negation-Limited Formulas.
Proceedings of the Approximation, 2015

2014
Secret-Sharing for NP from Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2014

One-Way Functions and (Im)Perfect Obfuscation.
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014

Secret-Sharing for NP.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Hardness Preserving Reductions via Cuckoo Hashing.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Average-case lower bounds for formula size.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Improved Average-Case Lower Bounds for DeMorgan Formula Size.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

2012
The Spectrum of Small DeMorgan Formulas.
Electron. Colloquium Comput. Complex., 2012


  Loading...