Nir Bitansky

Orcid: 0000-0001-8361-6035

According to our database1, Nir Bitansky authored at least 72 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Shuffling is Universal: Statistical Additive Randomized Encodings for All Functions.
IACR Cryptol. ePrint Arch., 2025

Additive Randomized Encodings from Public Key Encryption.
IACR Cryptol. ePrint Arch., 2025

Succinct Randomized Encodings from Laconic Function Evaluation, Faster and Simpler.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Additive Randomized Encodings from Public Key Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Succinct Randomized Encodings from Non-compact Functional Encryption, Faster and Simpler.
IACR Cryptol. ePrint Arch., 2024

Batch Proofs Are Statistically Hiding.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

Dot-Product Proofs and Their Applications.
Proceedings of the 65th IEEE Annual Symposium on Foundations of Computer Science, 2024

Reusable Online-Efficient Commitments.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Amplification of Non-interactive Zero Knowledge, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Robust Additive Randomized Encodings from IO and Pseudo-Non-linear Codes.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Bootstrapping Homomorphic Encryption via Functional Encryption.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

Non-interactive Universal Arguments.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
PPAD is as Hard as LWE and Iterated Squaring.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Non-malleable Commitments Against Quantum Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Statistically Sender-Private OT from LPN and Derandomization.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Constructive Post-Quantum Reductions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Structure Versus Hardness Through the Obfuscation Lens.
SIAM J. Comput., 2021

Post-quantum Resettably-Sound Zero Knowledge.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Classical Binding for Quantum Commitments.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

2020
Weakly Extractable One-Way Functions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Characterizing Deterministic-Prover Zero Knowledge.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Post-quantum zero knowledge in constant rounds.
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020

On Oblivious Amplification of Coin-Tossing Protocols.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

On the Cryptographic Hardness of Local Search.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

2019
On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Weak zero-knowledge beyond the black-box barrier.
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019

Distributional Collision Resistance Beyond One-Way Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

On Round Optimal Statistical Zero Knowledge Arguments.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings.
SIAM J. Comput., 2018

Weak Zero-Knowledge Beyond the Black-Box Barrier.
IACR Cryptol. ePrint Arch., 2018

One-Message Zero Knowledge and Non-malleable Commitments.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Multi-collision resistance: a paradigm for keyless hash functions.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

2017
Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

A Note on Perfect Correctness by Derandomization.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

On Removing Graded Encodings from Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Structure vs. Hardness Through the Obfuscation Lens.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Indistinguishability Obfuscation: From Approximate to Exact.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Perfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

From Cryptomania to Obfustopia Through Secret-Key Functional Encryption.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

3-Message Zero Knowledge Against Human Ignorance.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Time-Lock Puzzles from Randomized Encodings.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

2015
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation.
SIAM J. Comput., 2015

Perfect Structure on the Edge of Chaos.
IACR Cryptol. ePrint Arch., 2015

ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Succinct Randomized Encodings and their Applications.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Indistinguishability Obfuscation from Functional Encryption.
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015

On the Cryptographic Hardness of Finding a Nash Equilibrium.
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015

2014
Getting inside the adversary's head: new directions in non- black- box knowledge extraction
PhD thesis, 2014

Succinct Randomized Encodings and their Applications.
IACR Cryptol. ePrint Arch., 2014

The Hunting of the SNARK.
IACR Cryptol. ePrint Arch., 2014

Obfuscation for Evasive Functions.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

On the existence of extractable one-way functions.
Proceedings of the Symposium on Theory of Computing, 2014

Leakage-Tolerant Computation with Input-Independent Preprocessing.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

On Virtual Grey Box Obfuscation for General Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input.
IACR Cryptol. ePrint Arch., 2013

Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall.
IACR Cryptol. ePrint Arch., 2013

How To Construct Extractable One-Way Functions Against Uniform Adversaries.
IACR Cryptol. ePrint Arch., 2013

Why "Fiat-Shamir for Proofs" Lacks a Proof.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Succinct Non-interactive Arguments via Linear Interactive Proofs.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

On the impossibility of approximate obfuscation and applications to resettable cryptography.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Recursive composition and bootstrapping for SNARKS and proof-carrying data.
Proceedings of the Symposium on Theory of Computing Conference, 2013

2012
Why "Fiat-Shamir for Proofs" Lacks a Proof.
IACR Cryptol. ePrint Arch., 2012

Point Obfuscation and 3-Round Zero-Knowledge.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Leakage-Tolerant Interactive Protocols.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again.
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012

From the Impossibility of Obfuscation to a New Non-Black-Box Simulation Technique.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012

Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
From Point Obfuscation To 3-round Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2011

Program Obfuscation with Leaky Hardware.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
On Strong Simulation and Composable Point Obfuscation.
Proceedings of the Advances in Cryptology, 2010


  Loading...