Lior Rotem

According to our database1, Lior Rotem authored at least 28 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Robust Steganography from Large Language Models.
CoRR, April, 2025

Context-Dependent Threshold Decryption and its Applications.
IACR Cryptol. ePrint Arch., 2025

Goldreich-Krawczyk Revisited: A Note on the Zero Knowledge of Proofs of Knowledge.
IACR Commun. Cryptol., 2025

Straight-Line Knowledge Extraction for Multi-Round Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Traceable Verifiable Random Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\varvec{\Sigma }$-Protocols.
J. Cryptol., September, 2024

From One-Time to Two-Round Reusable Multi-signatures Without Nested Forking.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Proactive Refresh for Accountable Threshold Signatures.
Proceedings of the Financial Cryptography and Data Security, 2024

Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Traceable Secret Sharing: Strong Security and Efficient Constructions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Traitor Tracing for Threshold Decryption.
IACR Cryptol. ePrint Arch., 2023

Post-Quantum Single Secret Leader Election (SSLE) from Publicly Re-Randomizable Commitments.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Accountable Threshold Signatures with Proactive Refresh.
IACR Cryptol. ePrint Arch., 2022

Revisiting the Uber Assumption in the Algebraic Group Model: Fine-Grained Bounds in Hidden-Order Groups and Improved Reductions in Bilinear Groups.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols.
IACR Cryptol. ePrint Arch., 2021

Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Non-malleable Vector Commitments via Local Equivocability.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for ${\varSigma }$-Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

Generic-Group Delay Functions Require Hidden-Order Groups.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Generically Speeding-Up Repeated Squaring Is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2018
Injective Trapdoor Functions via Derandomization: How Strong is Rudich's Black-Box Barrier?
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

The Security of Lazy Users in Out-of-Band Authentication.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

From Fairness to Full Security in Multiparty Computation.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2016
Characterization of Secure Multiparty Computation Without Broadcast.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016


  Loading...