Jack Doerner

According to our database1, Jack Doerner authored at least 17 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
From OT to OLE with Subquadratic Communication.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast.
IACR Cryptol. ePrint Arch., 2024

Threshold ECDSA in Three Rounds.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Sometimes You Can't Distribute Random-Oracle-Based Proofs.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Secure Multiparty Computation with Identifiable Abort via Vindicating Release.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Secure Multiparty Computation with Identifiable Abort from Vindicating Release.
IACR Cryptol. ePrint Arch., 2023

Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2020
Multiparty Generation of an RSA Modulus.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Secure Two-party Threshold ECDSA from ECDSA Assumptions.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Privacy-Preserving Distributed Linear Regression on High-Dimensional Data.
Proc. Priv. Enhancing Technol., 2017

Scaling ORAM for Secure Computation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Secure Linear Regression on Vertically Partitioned Datasets.
IACR Cryptol. ePrint Arch., 2016

Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Secure Stable Matching at Scale.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016


  Loading...