Mark Zhandry

Orcid: 0000-0001-7071-6272

Affiliations:
  • NTT Research, USA


According to our database1, Mark Zhandry authored at least 110 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Note on Quantum-Secure PRPs.
Quantum, 2025

A General Quantum Duality for Representations of Groups with Applications to Quantum Money, Lightning, and Fire.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

Toward Separating QMA from QCMA with a Classical Oracle.
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025

Optimal Traitor Tracing from Pairings.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

On Quantum Money and Evasive Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Hard Quantum Extrapolations in Quantum Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

How to Model Unitary Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

On One-Shot Signatures, Quantum vs. Classical Binding, and Obfuscating Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Quantum State Group Actions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Translating Between the Common Haar Random State Model and the Unitary Model.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
(Quantum) Indifferentiability and Pre-Computation.
IACR Cryptol. ePrint Arch., 2024

Composability in Watermarking Schemes.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

The Space-Time Cost of Purifying Quantum Computations.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Quantum Money from Abelian Group Actions.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

A Computational Separation Between Quantum No-Cloning and No-Telegraphing.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Adaptive Security in SNARGs via iO and Lossy Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Limits on the Power of Prime-Order Groups: Separating Q-Type from Static Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Somewhere Randomness Extraction and Security against Bounded-Storage Mass Surveillance.
IACR Cryptol. ePrint Arch., 2023

A Computational Separation Between Quantum No-cloning and No-teleportation.
CoRR, 2023

Multi-instance Randomness Extraction and Security Against Bounded-Storage Mass Surveillance.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Commitments to Quantum States.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

Another Round of Breaking and Making Quantum Money: - How to Not Build It from Lattices, and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Tracing Quantum State Distinguishers via Backtracking.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Computational Wiretap Coding from Indistinguishability Obfuscation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

The Relationship Between Idealized Models Under Computationally Bounded Adversaries.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Collusion Resistant Copy-Protection for Watermarkable Functionalities.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Adaptive Multiparty NIKE.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Verifiable Quantum Advantage without Structure.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

Incompressible Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

New Constructions of Collapsing Hashes.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

To Label, or Not To Label (in Generic Groups).
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Augmented Random Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

On the Feasibility of Unclonable Encryption, and More.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Full Quantum Equivalence of Group Action DLog and CDH, and More.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic Assumptions.
J. Cryptol., 2021

Redeeming Reset Indifferentiability and Post-Quantum Groups.
IACR Cryptol. ePrint Arch., 2021

Iterated Inhomogeneous Polynomials.
IACR Cryptol. ePrint Arch., 2021

Post-Quantum Succinct Arguments.
Electron. Colloquium Comput. Complex., 2021

Disappearing Cryptography in the Bounded Storage Model.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier.
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021

Classical vs Quantum Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

White Box Traitor Tracing.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Hidden Cosets and Applications to Unclonable Cryptography.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

New Approaches for Quantum Copy-Protection.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Redeeming Reset Indifferentiability and Applications to Post-quantum Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Franchised Quantum Money.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
A Note on Separating Classical and Quantum Random Oracles.
IACR Cryptol. ePrint Arch., 2020

Quantum Immune One-Time Memories.
IACR Cryptol. ePrint Arch., 2020

Unclonable Decryption Keys.
IACR Cryptol. ePrint Arch., 2020

Schrödinger's Pirate: How to Trace a Quantum Decoder.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Towards Non-interactive Witness Hiding.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

One-shot signatures and applications to hybrid quantum/classical authentication.
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

New Techniques for Traitor Tracing: Size N<sup>1/3</sup> and More from Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Indifferentiability for Public Key Cryptosystems.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Quantum Lightning Never Strikes the Same State Twice.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

On ELFs, Deterministic Encryption, and Correlated-Input Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

On Finding Quantum Multi-collisions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Simple Schemes in the Bounded Storage Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

New Techniques for Obfuscating Conjunctions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Revisiting Post-quantum Fiat-Shamir.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

The Distinction Between Fixed and Random Generators in Group-Based Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2018

Preventing Zeroizing Attacks on GGH15.
IACR Cryptol. ePrint Arch., 2018

Impossibility of Order-Revealing Encryption in Idealized Models.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Return of GGH15: Provable Security Against Zeroizing Attacks.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Parameter-Hiding Order Revealing Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
New Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks.
IACR Cryptol. ePrint Arch., 2017

Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2017

Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness.
IACR Cryptol. ePrint Arch., 2017

Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Breaking the Sub-Exponential Barrier in Obfustopia.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

New Security Notions and Feasibility Results for Authentication of Quantum Data.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks.
IACR Cryptol. ePrint Arch., 2016

How to Avoid Obfuscation Using Witness PRFs.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Strong Hardness of Privacy from Weak Traitor Tracing.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Cutting-Edge Cryptography Through the Lens of Secret Sharing.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Secure Obfuscation in a Weak Multilinear Map Model.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Functional Encryption Without Obfuscation.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Order-Revealing Encryption and the Hardness of Private Learning.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

The Magic of ELFs.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

How to Generate and Use Universal Samplers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Cryptography in the age of quantum computers.
PhD thesis, 2015

A note on the quantum collision and set equality problems.
Quantum Inf. Comput., 2015

Modern Cryptography Through the Lens of Secret Sharing.
IACR Cryptol. ePrint Arch., 2015

Post-Zeroizing Obfuscation: The case of Evasive Circuits.
IACR Cryptol. ePrint Arch., 2015

Quantum Oracle Classification - The Case of Group Structure.
CoRR, 2015

Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Adaptively Secure Broadcast Encryption with Small System Parameters.
IACR Cryptol. ePrint Arch., 2014

Obfuscating Low-Rank Matrix Branching Programs.
IACR Cryptol. ePrint Arch., 2014

Fully Secure Functional Encryption without Obfuscation.
IACR Cryptol. ePrint Arch., 2014

Fully Secure Attribute Based Encryption from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2014

Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Low Overhead Broadcast Encryption from Multilinear Maps.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World.
IACR Cryptol. ePrint Arch., 2013

Differing-Inputs Obfuscation and Applications.
IACR Cryptol. ePrint Arch., 2013

Quantum-Secure Message Authentication Codes.
Proceedings of the Advances in Cryptology, 2013

Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Identity-based Encryption is Secure in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2012

How to Construct Quantum Random Functions.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012

Secure Identity-Based Encryption in the Quantum Random Oracle Model.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Random Oracles in a Quantum World.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011


  Loading...