Lior Rotem

According to our database1, Lior Rotem authored at least 28 papers between 2018 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Robust Steganography from Large Language Models.
CoRR, April, 2025

Traceable Verifiable Random Functions.
IACR Cryptol. ePrint Arch., 2025

Context-Dependent Threshold Decryption and its Applications.
IACR Cryptol. ePrint Arch., 2025

Goldreich-Krawczyk Revisited: A Note on the Zero Knowledge of Proofs of Knowledge.
IACR Commun. Cryptol., 2025

2024
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\varvec{\Sigma }$-Protocols.
J. Cryptol., September, 2024

Straight-Line Knowledge Extraction for Multi-Round Protocols.
IACR Cryptol. ePrint Arch., 2024

From One-Time to Two-Round Reusable Multi-Signatures without Nested Forking.
IACR Cryptol. ePrint Arch., 2024

Traceable Secret Sharing: Strong Security and Efficient Constructions.
IACR Cryptol. ePrint Arch., 2024

Proactive Refresh for Accountable Threshold Signatures.
Proceedings of the Financial Cryptography and Data Security, 2024

Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Non-malleable Vector Commitments via Local Equivocability.
J. Cryptol., October, 2023

Traitor Tracing for Threshold Decryption.
IACR Cryptol. ePrint Arch., 2023

Post-Quantum Single Secret Leader Election (SSLE) From Publicly Re-randomizable Commitments.
IACR Cryptol. ePrint Arch., 2023

2022
From Fairness to Full Security in Multiparty Computation.
J. Cryptol., 2022

A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff.
IACR Cryptol. ePrint Arch., 2022

Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups.
IACR Cryptol. ePrint Arch., 2022

Accountable Threshold Signatures with Proactive Refresh.
IACR Cryptol. ePrint Arch., 2022

2021
Injective Trapdoor Functions via Derandomization: How Strong is Rudich's Black-Box Barrier?
J. Cryptol., 2021

Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols.
IACR Cryptol. ePrint Arch., 2021

Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions.
IACR Cryptol. ePrint Arch., 2021

Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for ${\varSigma }$-Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
The Security of Lazy Users in Out-of-Band Authentication.
ACM Trans. Priv. Secur., 2020

Generic-Group Delay Functions Require Hidden-Order Groups.
IACR Cryptol. ePrint Arch., 2020

Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions.
IACR Cryptol. ePrint Arch., 2020

Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions.
IACR Cryptol. ePrint Arch., 2020

2019
Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery.
IACR Cryptol. ePrint Arch., 2019

2018
Characterization of Secure Multiparty Computation Without Broadcast.
J. Cryptol., 2018

Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal.
IACR Cryptol. ePrint Arch., 2018


  Loading...