Jonathan Katz

Orcid: 0000-0001-6084-9303

Affiliations:
  • University of Maryland, College Park, USA


According to our database1, Jonathan Katz authored at least 272 papers between 2000 and 2025.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2021, "For contributions to cryptographic protocol design and cryptography education".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Correlated Noise Mechanisms for Differentially Private Learning.
CoRR, June, 2025

Olingo: Threshold Lattice Signatures with DKG and Identifiable Abort.
IACR Cryptol. ePrint Arch., 2025

Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures.
IACR Cryptol. ePrint Arch., 2025

Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures.
IACR Commun. Cryptol., 2025

SHARK: Actively Secure Inference Using Function Secret Sharing.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Hash-Prune-Invert: Improved Differentially Private Heavy-Hitter Detection in the Two-Server Model.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Best-Possible Unpredictable Proof-of-Stake: An Impossibility and a Practical Design.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

Secret Sharing with Publicly Verifiable Deletion.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

On the Adaptive Security of FROST.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Large-Scale Private Set Intersection in the Client-Server Setting.
IACR Cryptol. ePrint Arch., 2024

Non-Interactive Zero-Knowledge Proofs with Certified Deletion.
IACR Cryptol. ePrint Arch., 2024

A Quantum "Lifting Theorem" for Constructions of Pseudorandom Generators from Random Oracles.
CoRR, 2024

Brief Announcement: Best-Possible Unpredictable Proof-Of-Stake.
Proceedings of the 38th International Symposium on Distributed Computing, 2024

Scalable Mixed-Mode MPC.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

Post-quantum Security of Tweakable Even-Mansour, and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

LATKE: A Framework for Constructing Identity-Binding PAKEs.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Round-Optimal, Fully Secure Distributed Key Generation.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Field-Agnostic SNARKs from Expand-Accumulate Codes.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Actively Secure Private Set Intersection in the Client-Server Setting.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Blind Multisignatures for Anonymous Tokens with Decentralized Issuance.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Zero-Knowledge Proofs of Training for Deep Neural Networks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic.
J. Cryptol., July, 2023

Round Optimal Robust Distributed Key Generation.
IACR Cryptol. ePrint Arch., 2023

Two-Round Threshold Lattice Signatures from Threshold Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Analyzing the Real-World Security of the Algorand Blockchain.
IACR Cryptol. ePrint Arch., 2023

A Watermark for Large Language Models.
Proceedings of the International Conference on Machine Learning, 2023

Analyzing the Real-World Security of the Algorand Blockchain.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Fiat-Shamir Security of FRI and Related SNARKs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Cloud Computing Security: Foundations and Research Directions.
Found. Trends Priv. Secur., 2022

Musings on the HashGraph Protocol: Its Security and Its Limitations.
CoRR, 2022

CoVault: A Secure Analytics Platform.
CoRR, 2022

A Provably Secure, Lightweight Protocol for Anonymous Authentication.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Post-Quantum Security of the Even-Mansour Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

An Analysis of the Algebraic Group Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

State Machine Replication Under Changing Network Conditions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Spreading the Privacy Blanket: - Differentially Oblivious Shuffling for Differential Privacy.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
A Fake Online Repository Generation Engine for Cyber Deception.
IEEE Trans. Dependable Secur. Comput., 2021

A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability.
IACR Cryptol. ePrint Arch., 2021

Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols.
IACR Cryptol. ePrint Arch., 2021

Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Constant-Overhead Zero-Knowledge for RAM Programs.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

EasyPQC: Verifying Post-Quantum Cryptography.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

RPPLNS: Pay-per-last-N-shares with a Randomised Twist.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

Boosting the Security of Blind Signature Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Algebraic Adversaries in the Universal Composability Framework.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits.
IACR Cryptol. ePrint Arch., 2020

On the Security of Time-Locked Puzzles and Timed Commitments.
IACR Cryptol. ePrint Arch., 2020

Network-Agnostic State Machine Replication.
IACR Cryptol. ePrint Arch., 2020

On the Security of Time-Lock Puzzles and Timed Commitments.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Asynchronous Byzantine Agreement with Subquadratic Communication.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Efficient 3-Party Distributed ORAM.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Adversarial Classification Under Differential Privacy.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely.
Proceedings of the Computer Security - ESORICS 2020, 2020

Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting).
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Universally Composable Relaxed Password Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Synchronous Consensus with Optimal Asynchronous Fallback Guarantees.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Constant-Round Group Key Exchange from the Ring-LWE Assumption.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Covert Security with Public Verifiability: Faster, Leaner, and Simpler.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Statistical Privacy in Distributed Average Consensus on Bounded Real Inputs.
Proceedings of the 2019 American Control Conference, 2019

Competing (Semi-)Selfish Miners in Bitcoin.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Verifiable Graph Processing.
ACM Trans. Priv. Secur., 2018

Information-Theoretic Privacy in Distributed Average Consensus.
CoRR, 2018

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Optimizing Authenticated Garbling for Faster Secure Two-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Simple and Efficient Two-Server ORAM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
A Zero-Knowledge Version of vSQL.
IACR Cryptol. ePrint Arch., 2017

Authenticated Garbling and Efficient Maliciously Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2017

Authenticated Garbling and Communication-Efficient, Constant-Round, Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2017

Provable Security of Substitution-Permutation Networks.
IACR Cryptol. ePrint Arch., 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Incentivizing Blockchain Forks via Whale Transactions.
Proceedings of the Financial Cryptography and Data Security, 2017

An Expressive (Zero-Knowledge) Set Accumulator.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Faster Secure Two-Party Computation in the Single-Execution Setting.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Symmetric-Key Broadcast Encryption: The Multi-sender Case.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Efficient, Reusable Fuzzy Extractors from LWE.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Experimentation for Developing Evidence-Based UI Standards of Mobile Survey Questionnaires.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Global-Scale Secure Multiparty Computation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Subset Predicate Encryption and Its Applications.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Guest Editorial.
IET Inf. Secur., 2016

Faster Two-Party Computation Secure Against Malicious Adversaries in the Single-Execution Setting.
IACR Cryptol. ePrint Arch., 2016

An Oblivious Parallel RAM with O(log<sup>2</sup> N) Parallel Runtime Blowup.
IACR Cryptol. ePrint Arch., 2016

Efficiently Enforcing Input Validity in Secure Two-party Computation.
IACR Cryptol. ePrint Arch., 2016

The Cut-and-Choose Game and Its Application to Cryptographic Protocols.
Proceedings of the 25th USENIX Security Symposium, 2016

All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption.
Proceedings of the 25th USENIX Security Symposium, 2016

Revisiting Square-Root ORAM: Efficient Random Access in Multi-party Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Analysis of a Proposed Hash-Based Signature Standard.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

10-Round Feistel is Indifferentiable from an Ideal Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Secure Computation of MIPS Machine Code.
Proceedings of the Computer Security - ESORICS 2016, 2016

5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Selective-Opening Security in the Presence of Randomness Failures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
How to Authenticate any Data Structure.
Tiny Trans. Comput. Sci., 2015

Functional Encryption from (Small) Hardwae Tokens.
IACR Cryptol. ePrint Arch., 2015

Multi-Client Verifiable Computation with Stronger Security Guarantees.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

How Fair is Your Protocol?: A Utility-based Approach to Protocol Optimality.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015

Hash Functions from Defective Ideal Ciphers.
Proceedings of the Topics in Cryptology, 2015

IntegriDB: Verifiable SQL for Outsourced Databases.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Automated Analysis and Synthesis of Authenticated Encryption Schemes.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Review of networked life: 20 questions and answers by Mung Chiang.
SIGACT News, 2014

Review of the block cipher companion by Lars R. Knudsen and Matthew J.B. Robshaw.
SIGACT News, 2014

Pseudonymous Secure Computation from Time-Lock Puzzles.
IACR Cryptol. ePrint Arch., 2014

Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds.
IACR Cryptol. ePrint Arch., 2014

Implementing Cryptographic Program Obfuscation.
IACR Cryptol. ePrint Arch., 2014

(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Permacoin: Repurposing Bitcoin Work for Data Preservation.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Automating Efficient RAM-Model Secure Computation.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Authenticated data structures, generically.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

Distributing the setup in universally composable multi-party computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Verifiable Oblivious Storage.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Multi-input Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Automated Analysis and Synthesis of Block-Cipher Modes of Operation.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Amortizing Garbled Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Efficient Three-Party Computation from Cut-and-Choose.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

ALITHEIA: Towards Practical Verifiable Graph Processing.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Cryptography.
Proceedings of the Computing Handbook, 2014

Introduction to Modern Cryptography, Second Edition
CRC Press, ISBN: 9781466570269, 2014

2013
Review of identity-based encryption by Sanjit Chattarjee and Palash Sarkar.
SIGACT News, 2013

Review of Applied Information Security by David Basin, Patrick Schaller, and Michael Schläpfer.
SIGACT News, 2013

Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

One-Round Multi-Party Communication Complexity of Distinguishing Sums.
Electron. Colloquium Comput. Complex., 2013

Universally Composable Synchronous Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Feasibility and Completeness of Cryptographic Tasks in the Quantum World.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Multi-Client Non-interactive Verifiable Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Brief announcement: a game-theoretic model motivated by the darpa network challenge.
Proceedings of the 25th ACM Symposium on Parallelism in Algorithms and Architectures, 2013

Anon-Pass: Practical Anonymous Subscriptions.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Rational Protocol Design: Cryptography against Incentive-Driven Adversaries.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical Data Privacy.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Functional Encryption from (Small) Hardware Tokens.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell.
SIGACT News, 2012

Special Section on the Forty-First Annual ACM Symposium on Theory of Computing (STOC 2009).
SIAM J. Comput., 2012

A Game-Theoretic Model Motivated by the DARPA Network Challenge
CoRR, 2012

On the Security of the "Free-XOR" Technique.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Knowledge-oriented secure multiparty computation.
Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, 2012

Constant-Round Multi-party Private Set Union Using Reversed Laurent Series.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Byzantine Agreement with a Rational Adversary.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

Fair Computation with Rational Players.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Collusion-Preserving Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Secure two-party computation in sublinear (amortized) time.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation.
SIAM J. Comput., 2011

Secure Computation with Sublinear Amortized Work.
IACR Cryptol. ePrint Arch., 2011

Faster Secure Two-Party Computation Using Garbled Circuits.
Proceedings of the 20th USENIX Security Symposium, 2011

Round-Optimal Password-Based Authenticated Key Exchange.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Impossibility of Blind Signatures from One-Way Permutations.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Limits of Computational Differential Privacy in the Client/Server Setting.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Adaptively secure broadcast, revisited.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Efficient Privacy-Preserving Biometric Identification.
Proceedings of the Network and Distributed System Security Symposium, 2011

Efficient Secure Computation with Garbled Circuits.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Constant-Round Private Function Evaluation with Linear Complexity.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Public-Key Cryptography.
Proceedings of the Handbook of Information and Communication Security, 2010

Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols.
J. Cryptol., 2010

VMCrypt - Modular Software Architecture for Scalable Secure Computation.
IACR Cryptol. ePrint Arch., 2010

One-Round Password-Based Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2010

A New Framework for Password-Based Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2010

Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.
IACR Cryptol. ePrint Arch., 2010

Efficient Rational Secret Sharing in Standard Communication Networks.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010

Secure Network Coding over the Integers.
Proceedings of the Public Key Cryptography, 2010

Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

Partial Fairness in Secure Two-Party Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Secure text processing with applications to private DNA matching.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

A new framework for efficient password-based authenticated key exchange.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

A Group Signature Scheme from Lattice Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Digital Signatures.
Springer, ISBN: 978-0-387-27711-0, 2010

2009
Efficient and secure authenticated key exchange using weak passwords.
J. ACM, 2009

Signature Schemes with Bounded Leakage Resilience.
IACR Cryptol. ePrint Arch., 2009

Complete Fairness in Multi-party Computation without an Honest Majority.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Composability and On-Line Deniability of Authentication.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Signing a Linear Subspace: Signature Schemes for Network Coding.
Proceedings of the Public Key Cryptography, 2009

Collusion-Free Multiparty Computation in the Mediated Model.
Proceedings of the Advances in Cryptology, 2009

Attacking cryptographic schemes based on "perturbation polynomials".
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations.
Proceedings of the Advances in Cryptology, 2009

Signature Schemes with Bounded Leakage Resilience.
Proceedings of the Advances in Cryptology, 2009

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices.
Proceedings of the Advances in Cryptology, 2009

Proofs of Storage from Homomorphic Identification Protocols.
Proceedings of the Advances in Cryptology, 2009

2008
Cryptography.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Collusion-Free Multiparty Computation in the Mediated Model.
IACR Cryptol. ePrint Arch., 2008

Bridging Game Theory and Cryptography: Recent Results and Future Directions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Which Languages Have 4-Round Zero-Knowledge Proofs?
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Universally Composable Multi-party Computation with an Unreliable Common Reference String.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Complete fairness in secure two-party computation.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008

Improving the Round Complexity of VSS in Point-to-Point Networks.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

How to Encrypt with a Malicious Random Number Generator.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
Proceedings of the Advances in Cryptology, 2008

Aggregate Message Authentication Codes.
Proceedings of the Topics in Cryptology, 2008

2007
Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005.
SIGACT News, 2007

Chosen-Ciphertext Security from Identity-Based Encryption.
SIAM J. Comput., 2007

Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems.
J. Cryptol., 2007

Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

On achieving the "best of both worlds" in secure multiparty computation.
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007

Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise.
Proceedings of the Cryptography and Coding, 2007

Round Complexity of Authenticated Broadcast with a Dishonest Majority.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007

Round-Efficient Secure Computation in Point-to-Point Networks.
Proceedings of the Advances in Cryptology, 2007

Universally Composable Multi-party Computation Using Tamper-Proof Hardware.
Proceedings of the Advances in Cryptology, 2007

Universally-Composable Two-Party Computation in Two Rounds.
Proceedings of the Advances in Cryptology, 2007

Exploiting approximate transitivity of trust.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

Introduction to Modern Cryptography
Chapman and Hall/CRC Press, ISBN: 978-1-58488-551-1, 2007

2006
Review of "Primality Testing in Polynomial Time by Martin Dietzfelbinger", Springer-Verlag, 2004.
SIGACT News, 2006

Review of "A Computational Introduction to Number Theory and Algebra by Victor Shoup", Cambridge University Press, 2005.
SIGACT News, 2006

Characterization of Security Notions for Probabilistic Private-Key Encryption.
J. Cryptol., 2006

Analyzing the HB and HB+ Protocols in the "Large Error" Case.
IACR Cryptol. ePrint Arch., 2006

Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

Rational Secret Sharing, Revisited.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Reliable broadcast in radio networks: the bounded collision case.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Principles of Distributed Computing, 2006

Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

On Expected Constant-Round Protocols for Byzantine Agreement.
Proceedings of the Advances in Cryptology, 2006

Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.
Proceedings of the Advances in Cryptology, 2006

2005
A pairwise key predistribution scheme for wireless sensor networks.
ACM Trans. Inf. Syst. Secur., 2005

Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001).
SIGACT News, 2005

Bounds on the Efficiency of Generic Cryptographic Constructions.
SIAM J. Comput., 2005

Parallel and Concurrent Security of the HB and HB+ Protocols.
IACR Cryptol. ePrint Arch., 2005

On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions.
IACR Cryptol. ePrint Arch., 2005

Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Chosen-Ciphertext Security of Multiple Encryption.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Adaptively-Secure, Non-interactive Public-Key Encryption.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Bounds on the Efficiency of "Black-Box" Commitment Schemes.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Reducing Complexity Assumptions for Statistically-Hiding Commitment.
Proceedings of the Advances in Cryptology, 2005

Universally Composable Password-Based Key Exchange.
Proceedings of the Advances in Cryptology, 2005

Secure Remote Authentication Using Biometric Data.
Proceedings of the Advances in Cryptology, 2005

Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption.
Proceedings of the Topics in Cryptology, 2005

Modeling insider attacks on group key-exchange protocols.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Two-Server Password-Only Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Reducing Complexity Assumptions for Statistically-Hiding Commitment.
IACR Cryptol. ePrint Arch., 2004

Identity-Based Zero Knowledge.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Trust-Preserving Set Operations.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Chosen-Ciphertext Security from Identity-Based Encryption.
Proceedings of the Advances in Cryptology, 2004

A Generic Construction for Intrusion-Resilient Public-Key Encryption.
Proceedings of the Topics in Cryptology, 2004

Round-Optimal Secure Two-Party Computation.
Proceedings of the Advances in Cryptology, 2004

One-Round Protocols for Two-Party Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Lower bounds on the efficiency of encryption and digital signature schemes.
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003

Toward Secure Key Distribution in Truly Ad-Hoc Networks.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

Strong Key-Insulated Signature Schemes.
Proceedings of the Public Key Cryptography, 2003

Binary Tree Encryption: Constructions and Applications.
Proceedings of the Information Security and Cryptology, 2003

Round Efficiency of Multi-party Computation with a Dishonest Majority.
Proceedings of the Advances in Cryptology, 2003

Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications.
Proceedings of the Advances in Cryptology, 2003

A Forward-Secure Public-Key Encryption Scheme.
Proceedings of the Advances in Cryptology, 2003

Intrusion-Resilient Public-Key Encryption.
Proceedings of the Topics in Cryptology, 2003

Scalable Protocols for Authenticated Group Key Exchange.
Proceedings of the Advances in Cryptology, 2003

Efficiency improvements for signature schemes with tight security reductions.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
A Forward-Secure Public-Key Encryption Scheme.
IACR Cryptol. ePrint Arch., 2002

Forward Secrecy in Password-Only Key Exchange Protocols.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG.
Proceedings of the Information Security, 5th International Conference, 2002

Key-Insulated Public Key Cryptosystems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Threshold Cryptosystems Based on Factoring.
Proceedings of the Advances in Cryptology, 2002

2001
Incremental Unforgeable Encryption.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords.
Proceedings of the Advances in Cryptology, 2001

Cryptographic Counters and Applications to Electronic Voting.
Proceedings of the Advances in Cryptology, 2001

Efficient and Non-interactive Non-malleable Commitment.
Proceedings of the Advances in Cryptology, 2001

2000
A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols.
Proceedings of the 9th USENIX Security Symposium, 2000

Complete characterization of security notions for probabilistic private-key encryption.
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

On the efficiency of local decoding procedures for error-correcting codes.
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000


  Loading...