Mark Simkin

Orcid: 0000-0002-7325-5261

Affiliations:
  • Ethereum Foundation, Aarhus, Denmark
  • Aarhus University, Denmark
  • Saarland University, Germany (former)


According to our database1, Mark Simkin authored at least 58 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Robust Distributed Arrays: Provably Secure Networking for Data Availability Sampling.
CoRR, April, 2025

Silent Threshold Encryption with One-Shot Adaptive Security.
IACR Cryptol. ePrint Arch., 2025

OCash: Fully Anonymous Payments Between Blockchain Light Clients.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

2024
Securely Computing One-Sided Matching Markets.
IACR Cryptol. ePrint Arch., 2024

Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More.
IACR Cryptol. ePrint Arch., 2024

Foundations of Data Availability Sampling.
IACR Commun. Cryptol., 2024

The Power of NAPs: - Compressing OR-Proofs via Collision-Resistant Hashing.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Invertible Bloom Lookup Tables with Less Memory and Randomness.
Proceedings of the 32nd Annual European Symposium on Algorithms, 2024

FRIDA: Data Availability Sampling from FRI.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Jackpot: Non-interactive Aggregatable Lotteries.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Compressing Encrypted Data Over Small Fields.
IACR Cryptol. ePrint Arch., 2023

Threshold Private Set Intersection with Better Communication Complexity.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Stronger Lower Bounds for Leakage-Resilient Secret Sharing.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023

How to Compress Encrypted Data.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Distributed Shuffling in Adversarial Environments.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

Chipmunk: Better Synchronized Multi-Signatures from Lattices.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Ramen: Souper Fast Three-Party Computation for RAM Programs.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Trans. Inf. Theory, 2022

On Sufficient Oracles for Secure Computation with Identifiable Abort.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Multiparty Computation with Covert Security and Public Verifiability.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

Caulk: Lookup Arguments in Sublinear Time.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Squirrel: Efficient Synchronized Multi-Signatures from Lattices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Laconic Private Set-Intersection From Pairings.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Property-Preserving Hash Functions from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2021

Optimal Oblivious Priority Queues.
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021

On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Robust Property-Preserving Hash Functions for Hamming Distance and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Two-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory.
IACR Cryptol. ePrint Arch., 2020

Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors.
IACR Cryptol. ePrint Arch., 2020

Lower Bounds for Multi-server Oblivious RAMs.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Secret Sharing Lower Bound: Either Reconstruction is Hard or Shares are Long.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Use Your Brain! Arithmetic 3PC for Any Modulus with Active Security.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

Lower Bounds for Leakage-Resilient Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Black-Box Transformations from Passive to Covert Security with Public Verifiability.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Exponential Lower Bounds for Secret Sharing.
IACR Cryptol. ePrint Arch., 2019

Optimal Oblivious Priority Queues and Offline Oblivious RAM.
IACR Cryptol. ePrint Arch., 2019

Use your Brain! Arithmetic 3PC For Any Modulus with Active Security.
IACR Cryptol. ePrint Arch., 2019

The Communication Complexity of Threshold Private Set Intersection.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Functional Credentials.
Proc. Priv. Enhancing Technol., 2018

Oblivious RAM with Small Storage Overhead.
IACR Cryptol. ePrint Arch., 2018

Compact Zero-Knowledge Proofs of Small Hamming Weight.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Continuously Non-malleable Codes with Split-State Refresh.
Proceedings of the Applied Cryptography and Network Security, 2018

2016
Nearly Optimal Verifiable Data Streaming.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
Nearly Optimal Verifiable Data Streaming (Full Version).
IACR Cryptol. ePrint Arch., 2015

Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys.
IACR Cryptol. ePrint Arch., 2015

VeriStream - A Framework for Verifiable Data Streaming.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Ubic: Bridging the Gap between Digital Cryptography and the Physical World.
Proceedings of the Computer Security - ESORICS 2014, 2014

POSTER: Enhancing Security and Privacy with Google Glass.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
Proceedings of the Applied Cryptography and Network Security, 2014


  Loading...