Ilan Komargodski

Orcid: 0000-0002-1647-2112

Affiliations:
  • The Hebrew University of Jerusalem, Israel


According to our database1, Ilan Komargodski authored at least 78 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Memory Checking Requires Logarithmic Overhead.
Electron. Colloquium Comput. Complex., 2024

Scalable Distributed Agreement from LWE: Byzantine Agreement, Broadcast, and Leader Election.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

2023
On Time-Space Tradeoffs for Bounded-Length Collisions in Merkle-Damgård Hashing.
Comput. Complex., December, 2023

Decentralized Multi-authority ABE for sfNC<sup>1</sup> from BDH.
J. Cryptol., April, 2023

Oblivious RAM with Worst-Case Logarithmic Overhead.
J. Cryptol., April, 2023

OptORAMa: Optimal Oblivious RAM.
J. ACM, February, 2023

New Bounds on the Local Leakage Resilience of Shamir's Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2023

3-Party Secure Computation for RAMs: Optimal and Concretely Efficient.
IACR Cryptol. ePrint Arch., 2023

Optimal Load-Balanced Scalable Distributed Agreement.
IACR Cryptol. ePrint Arch., 2023

Scalable Agreement Protocols with Optimal Optimistic Efficiency.
IACR Cryptol. ePrint Arch., 2023

Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions.
IACR Cryptol. ePrint Arch., 2023

FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM.
IACR Cryptol. ePrint Arch., 2023

Verifying Groups in Linear Time.
Electron. Colloquium Comput. Complex., 2023

Brief Announcement: Scalable Agreement Protocols with Optimal Optimistic Efficiency.
Proceedings of the 37th International Symposium on Distributed Computing, 2023

Distributed-Prover Interactive Proofs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

On Distributed Randomness Generation in Blockchains.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

The Cost of Statistical Security in Proofs for Repeated Squaring.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

2022
On the Complexity of Compressing Obfuscation.
J. Cryptol., 2022

SPARKs: Succinct Parallelizable Arguments of Knowledge.
J. ACM, 2022

Differentially Oblivious Turing Machines.
IACR Cryptol. ePrint Arch., 2022

log*-Round Game-Theoretically-Fair Leader Election.
IACR Cryptol. ePrint Arch., 2022

The Cost of Statistical Security in Interactive Proofs for Repeated Squaring.
IACR Cryptol. ePrint Arch., 2022

Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions.
IACR Cryptol. ePrint Arch., 2022

Maliciously Secure Massively Parallel Computation for All-but-One Corruptions.
IACR Cryptol. ePrint Arch., 2022

Fully Adaptive Decentralized Multi-Authority ABE.
IACR Cryptol. ePrint Arch., 2022

Practical (Post-Quantum) Key Combiners from One-Wayness and Applications to TLS.
IACR Cryptol. ePrint Arch., 2022

log <sup>*</sup>-Round Game-Theoretically-Fair Leader Election.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Maliciously-Secure MrNISC in the Plain Model.
IACR Cryptol. ePrint Arch., 2021

Decentralized Multi-Authority ABE for NC^1 from Computational-BDH.
IACR Cryptol. ePrint Arch., 2021

Multiparty Reusable Non-Interactive Secure Computation from LWE.
IACR Cryptol. ePrint Arch., 2021

A Lower Bound for Adaptively-Secure Collective Coin Flipping Protocols.
Comb., 2021

A Logarithmic Lower Bound for Oblivious RAM (for All Parameters).
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Non-malleable Codes for Bounded Parallel-Time Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Threshold Secret Sharing Requires a Linear-Size Alphabet.
Theory Comput., 2020

From Minicrypt to Obfustopia via Private-Key Functional Encryption.
J. Cryptol., 2020

Lower Bound for Oblivious RAM with Large Cells.
IACR Cryptol. ePrint Arch., 2020

Secure Massively Parallel Computation for Dishonest Majority.
IACR Cryptol. ePrint Arch., 2020

Non-Malleable Time-Lock Puzzles and Applications.
IACR Cryptol. ePrint Arch., 2020

Decentralized Multi-Authority ABE for DNFs from LWE.
IACR Cryptol. ePrint Arch., 2020

Non-Malleable Codes for Bounded Polynomial Depth Tampering.
IACR Cryptol. ePrint Arch., 2020

Optimal Oblivious Parallel RAM.
IACR Cryptol. ePrint Arch., 2020

Oblivious Parallel Tight Compaction.
IACR Cryptol. ePrint Arch., 2020

2019
Hardness-Preserving Reductions via Cuckoo Hashing.
J. Cryptol., 2019

White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing.
J. ACM, 2019

Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2019

Impossibility of Strong KDM Security with Auxiliary Input.
IACR Cryptol. ePrint Arch., 2019

Continuous Verifiable Delay Functions.
IACR Cryptol. ePrint Arch., 2019

Distributional Collision Resistance Beyond One-Way Functions.
IACR Cryptol. ePrint Arch., 2019

On Perfect Correctness without Derandomization.
IACR Cryptol. ePrint Arch., 2019

Instance Complexity and Unlabeled Certificates in the Decision Tree Model.
Electron. Colloquium Comput. Complex., 2019

2018
Leakage resilient one-way functions: The auxiliary-input setting.
Theor. Comput. Sci., 2018

Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions.
J. Cryptol., 2018

Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions.
J. Cryptol., 2018

Cutting-edge cryptography through the lens of secret sharing.
Inf. Comput., 2018

On Distributional Collision Resistant Hashing.
IACR Cryptol. ePrint Arch., 2018

Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation.
IACR Cryptol. ePrint Arch., 2018

OptORAMa: Optimal Oblivious RAM.
IACR Cryptol. ePrint Arch., 2018

Communication with Contextual Uncertainty.
Comput. Complex., 2018

2017
Negation-limited formulas.
Theor. Comput. Sci., 2017

Improved Average-Case Lower Bounds for De Morgan Formula Size: Matching Worst-Case Lower Bound.
SIAM J. Comput., 2017

Secret-Sharing for NP.
J. Cryptol., 2017

Evolving Secret Sharing: Dynamic Thresholds and Robustness.
IACR Cryptol. ePrint Arch., 2017

Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions.
IACR Cryptol. ePrint Arch., 2017

Be Adaptive, Avoid Overcommitting.
IACR Cryptol. ePrint Arch., 2017

Non-Interactive Multiparty Computation without Correlated Randomness.
IACR Cryptol. ePrint Arch., 2017

Non-Trivial Witness Encryption and Null-iO from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2017

Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation).
Electron. Colloquium Comput. Complex., 2017

2016
How to Share a Secret, Infinitely.
Electron. Colloquium Comput. Complex., 2016

2015
Modern Cryptography Through the Lens of Secret Sharing.
IACR Cryptol. ePrint Arch., 2015

From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting.
IACR Cryptol. ePrint Arch., 2015

Communication with Contextual Uncertainty.
Electron. Colloquium Comput. Complex., 2015

Compressing Communication in Distributed Protocols.
Electron. Colloquium Comput. Complex., 2015

2014
Secret-Sharing for NP from Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2014

One-Way Functions and (Im)perfect Obfuscation.
IACR Cryptol. ePrint Arch., 2014

Strong Locally Testable Codes with Relaxed Local Decoders.
Electron. Colloquium Comput. Complex., 2014

2013
Improved Average-Case Lower Bounds for DeMorgan Formula Size.
Electron. Colloquium Comput. Complex., 2013

2012
Average-Case Lower Bounds for Formula Size.
Electron. Colloquium Comput. Complex., 2012

The Spectrum of Small DeMorgan Formulas.
Electron. Colloquium Comput. Complex., 2012


  Loading...