Rafael Pass

Orcid: 0000-0001-7440-5690

Affiliations:
  • Cornell University, Ithaca, USA
  • Massachusetts Institute of Technology, Cambridge, MA, USA (former)


According to our database1, Rafael Pass authored at least 226 papers between 2003 and 2025.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2022, "For contributions to the foundations of cryptography".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Guest Column: On Cryptography and Meta-Complexity.
SIGACT News, June, 2025

On White-Box Learning and Public-Key Encryption.
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025

Hardness Along the Boundary: Towards One-Way Functions from the Worst-Case Hardness of Time-Bounded Kolmogorov Complexity.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

On Witness Encryption and Laconic Zero-Knowledge Arguments.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Lower Bounds on the Overhead of Indistinguishability Obfuscation.
Electron. Colloquium Comput. Complex., 2024

A Note on Zero-Knowledge for NP and One-Way Functions.
Electron. Colloquium Comput. Complex., 2024

Fair Interest Rates Are Impossible for Lending Pools: Results from Options Pricing.
CoRR, 2024

On the Viability of Open-Source Financial Rails: Economic Security of Permissionless Consensus.
CoRR, 2024

On One-Way Functions, the Worst-Case Hardness of Time-Bounded Kolmogorov Complexity, and Computational Depth.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

The Non-Uniform Perebor Conjecture for Time-Bounded Kolmogorov Complexity Is False.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

A Direct PRF Construction from Kolmogorov Complexity.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Public-Coin, Complexity-Preserving, Succinct Arguments of Knowledge for NP from Collision-Resistance.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Gap MCSP Is Not (Levin) NP-Complete in Obfustopia.
Proceedings of the 39th Computational Complexity Conference, 2024

Search-To-Decision Reductions for Kolmogorov Complexity.
Proceedings of the 39th Computational Complexity Conference, 2024

On Black-Box Meta Complexity and Function Inversion.
Proceedings of the Approximation, 2024

2023
Toward Basing Cryptography on the Hardness of EXP.
Commun. ACM, May, 2023

Can open decentralized ledgers be economically secure?
IACR Cryptol. ePrint Arch., 2023

Characterizing the Power of (Persistent) Randomness in Log-space.
Electron. Colloquium Comput. Complex., 2023

A Note On the Universality of Black-box MKtP Solvers.
Electron. Colloquium Comput. Complex., 2023

On One-way Functions and the Worst-case Hardness of Time-Bounded Kolmogorov Complexity.
Electron. Colloquium Comput. Complex., 2023

Counting Unpredictable Bits: A Simple PRG from One-Way Functions.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

On One-Way Functions and Sparse Languages.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Simplex Consensus: A Simple and Fast Consensus Protocol.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement.
Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, 2023

One-Way Functions and the Hardness of (Probabilistic) Time-Bounded Kolmogorov Complexity w.r.t. Samplable Distributions.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Leakage-Resilient Hardness vs Randomness.
Proceedings of the 38th Computational Complexity Conference, 2023

2022
Cosmic Security.
IACR Cryptol. ePrint Arch., 2022

Leakage-Resilient Hardness v.s. Randomness.
Electron. Colloquium Comput. Complex., 2022

Parallelizable Delegation from LWE.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Universal Reductions: Reductions Relative to Stateful Oracles.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Incrementally Verifiable Computation via Rate-1 Batch Arguments.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

On One-Way Functions from NP-Complete Problems.
Proceedings of the 37th Computational Complexity Conference, 2022

Characterizing Derandomization Through Hardness of Levin-Kolmogorov Complexity.
Proceedings of the 37th Computational Complexity Conference, 2022

Concurrently Composable Non-interactive Secure Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Guest Column: Average-case Complexity Through the Lens of Interactive Puzzles.
SIGACT News, 2021

A Tutorial on Concurrent Zero Knowledge.
IACR Cryptol. ePrint Arch., 2021

A Note on One-way Functions and Sparse Languages.
Electron. Colloquium Comput. Complex., 2021

On the Possibility of Basing Cryptography on $\EXP \neq \BPP$.
Electron. Colloquium Comput. Complex., 2021

Non-malleable Time-Lock Puzzles and Applications.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Cryptography from sublinear-time average-case hardness of time-bounded Kolmogorov complexity.
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021

Indistinguishability obfuscation from circular security.
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021

On the Possibility of Basing Cryptography on EXP≠ BPP.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Non-malleable Codes for Bounded Parallel-Time Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Non-Malleable Codes for Bounded Polynomial Depth Tampering.
IACR Cryptol. ePrint Arch., 2020

Blockchain with Varying Number of Players.
IACR Cryptol. ePrint Arch., 2020

Bayesian games with intentions.
Games Econ. Behav., 2020

Bucket Oblivious Sort: An Extremely Simple Oblivious Sort.
Proceedings of the 3rd Symposium on Simplicity in Algorithms, 2020

Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Impossibility of Strong KDM Security with Auxiliary Input.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Sublinear-Round Byzantine Agreement Under Corrupt Majority.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Is it Easier to Prove Theorems that are Guaranteed to be True?
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

On One-way Functions and Kolmogorov Complexity.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

Succinct Non-interactive Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions?
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Continuous Verifiable Delay Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

SPARKs: Succinct Parallelizable Arguments of Knowledge.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

On the Adaptive Security of MACs and PRFs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
A Round-Collapse Theorem for Computationally-Sound Protocols; or, TFNP is Hard (on Average) in Pessiland.
IACR Cryptol. ePrint Arch., 2019

Round Complexity of Byzantine Agreement, Revisited.
IACR Cryptol. ePrint Arch., 2019

On Perfect Correctness without Derandomization.
IACR Cryptol. ePrint Arch., 2019

A Conceptually Well-Founded Characterization of Iterated Admissibility Using an "All I Know" Operator.
Proceedings of the Proceedings Seventeenth Conference on Theoretical Aspects of Rationality and Knowledge, 2019

Blind Certificate Authorities.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

On the Existence of Nash Equilibrium in Games with Resource-Bounded Players.
Proceedings of the Algorithmic Game Theory - 12th International Symposium, 2019

Communication Complexity of Byzantine Agreement, Revisited.
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019

Minimizing Trust in Hardware Wallets with Two Factor Signatures.
Proceedings of the Financial Cryptography and Data Security, 2019

Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.
Proceedings of the Financial Cryptography and Data Security, 2019

Consensus Through Herding.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Locality-Preserving Oblivious RAM.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Synchronous, with a Chance of Partition Tolerance.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Paradoxes in Fair Computer-Aided Decision Making.
Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 2019

A tutorial on concurrent zero-knowledge.
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019

2018
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings.
SIAM J. Comput., 2018

PaLa: A Simple Partially Synchronous Blockchain.
IACR Cryptol. ePrint Arch., 2018

PiLi: An Extremely Simple Synchronous Blockchain.
IACR Cryptol. ePrint Arch., 2018

Communication-Efficient Byzantine Agreement without Erasures.
CoRR, 2018

Achieving Fair Treatment in Algorithmic Classification.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

On the Security Loss of Unique Signatures.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Game Theoretic Notions of Fairness in Multi-party Coin Toss.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Thunderella: Blockchains with Optimistic Instant Confirmation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

On the Complexity of Compressing Obfuscation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Two-Round Concurrent Non-Malleable Commitment from Time-Lock Puzzles.
IACR Cryptol. ePrint Arch., 2017

Oblivious Computation with Data Locality.
IACR Cryptol. ePrint Arch., 2017

Reasoning about rationality.
Games Econ. Behav., 2017

A Knowledge-Based Analysis of the Blockchain Protocol.
Proceedings of the Proceedings Sixteenth Conference on Theoretical Aspects of Rationality and Knowledge, 2017

Socially Optimal Mining Pools.
Proceedings of the Web and Internet Economics - 13th International Conference, 2017

Hybrid Consensus: Efficient Consensus in the Permissionless Model.
Proceedings of the 31st International Symposium on Distributed Computing, 2017

Can We Access a Database Both Locally and Privately?
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

FruitChains: A Fair Blockchain.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017

Formal Abstractions for Attested Execution Secure Processors.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Analysis of the Blockchain Protocol in Asynchronous Networks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Rethinking Large-Scale Consensus.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

The Sleepy Model of Consensus.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Secure Channel Injection and Anonymous Proofs of Account Ownership.
IACR Cryptol. ePrint Arch., 2016

A Note on Black-Box Complexity of Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2016

Snow White: Provably Secure Proofs of Stake.
IACR Cryptol. ePrint Arch., 2016

The Sleepy Model of Consensus.
IACR Cryptol. ePrint Arch., 2016

Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Lower Bounds on Assumptions Behind Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Output-Compressing Randomized Encodings and Applications.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Oblivious Parallel RAM and Applications.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Computational Extensive-Form Games.
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016

Bounded KDM Security from iO and OWF.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Indistinguishability Obfuscation with Non-trivial Efficiency.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Sequential Equilibrium in Games of Imperfect Recall.
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Fifteenth International Conference, 2016

2015
Algorithmic rationality: Game theory with costly computation.
J. Econ. Theory, 2015

Constant-Round Nonmalleable Commitments from Any One-Way Function.
J. ACM, 2015

An Overview of ANONIZE: A Large-Scale Anonymous Survey System.
IEEE Secur. Priv., 2015

How to Use SNARKs in Universally Composable Protocols.
IACR Cryptol. ePrint Arch., 2015

Stronger Impossibility Results for Strategy-Proof Voting with i.i.d. Beliefs.
CoRR, 2015

On the Non-Existence of Nash Equilibrium in Games with Resource-Bounded Players.
CoRR, 2015

Outlier Privacy.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Tight Parallel Repetition Theorems for Public-Coin Arguments Using KL-Divergence.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

From Weak to Strong Zero-Knowledge and Applications.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Succinct Randomized Encodings and their Applications.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Voting with Coarse Beliefs.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

Better Outcomes from More Rationality.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Micropayments for Decentralized Currencies.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Limits of Extractability Assumptions with Distributional Auxiliary Input.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Decision Theory with Resource-Bounded Agents.
Top. Cogn. Sci., 2014

Concurrent Zero Knowledge, Revisited.
J. Cryptol., 2014

Succinct Garbling Schemes and Applications.
IACR Cryptol. ePrint Arch., 2014

Oblivious Parallel RAM.
IACR Cryptol. ePrint Arch., 2014

Large-Scale Secure Computation.
IACR Cryptol. ePrint Arch., 2014

Not Just an Empty Threat: Subgame-Perfect Equilibrium in Repeated Games Played by Computationally Bounded Players.
Proceedings of the Web and Internet Economics - 10th International Conference, 2014

4-Round Resettably-Sound Zero Knowledge.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

On Extractability Obfuscation.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

ANONIZE: A Large-Scale Anonymous Survey System.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

On the Impossibility of Black-Box Transformations in Mechanism Design.
Proceedings of the Algorithmic Game Theory - 7th International Symposium, 2014

Axiomatizing Rationality.
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Fourteenth International Conference, 2014

The truth behind the myth of the folk theorem.
Proceedings of the Innovations in Theoretical Computer Science, 2014

One-Way Functions and (Im)Perfect Obfuscation.
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014

Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

On the Impossibility of Cryptography with Tamperable Randomness.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Statistically-secure ORAM with Õ(log<sup>2</sup> n) Overhead.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Guest column: parallel repetition theorems for interactive arguments.
SIGACT News, 2013

Public-Coin Parallel Zero-Knowledge for NP.
J. Cryptol., 2013

Obfuscation from Semantically-Secure Multi-linear Encodings.
IACR Cryptol. ePrint Arch., 2013

Interactive Coding, Revisited.
IACR Cryptol. ePrint Arch., 2013

A Simple ORAM.
IACR Cryptol. ePrint Arch., 2013

Simultaneous Resettable WI from One-way Functions.
IACR Cryptol. ePrint Arch., 2013

On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses.
IACR Cryptol. ePrint Arch., 2013

Conservative belief and rationality.
Games Econ. Behav., 2013

Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead.
CoRR, 2013

Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Randomness-Dependent Message Security.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Game Theory with Translucent Players.
Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2013), 2013

Language-based Games.
Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2013), 2013

Non-black-box simulation from one-way functions and applications to resettable security.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Can theories be tested?: a cryptographic treatment of forecast testing.
Proceedings of the Innovations in Theoretical Computer Science, 2013

On the power of nonuniformity in proofs of security.
Proceedings of the Innovations in Theoretical Computer Science, 2013

On the power of many one-bit provers.
Proceedings of the Innovations in Theoretical Computer Science, 2013

Sequential Equilibrium in Computational Games.
Proceedings of the IJCAI 2013, 2013

Knowledge-Preserving Interactive Coding.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

Simultaneous Resettability from One-Way Functions.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

Constant-Round Concurrent Zero Knowledge from P-Certificates.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

From Unprovability to Environmentally Friendly Protocols.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

2012
A Parallel Repetition Theorem for Constant-Round Arthur-Merlin Proofs.
ACM Trans. Comput. Theory, 2012

Multi-Verifier Signatures.
J. Cryptol., 2012

The Curious Case of Non-Interactive Commitments.
IACR Cryptol. ePrint Arch., 2012

Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions.
IACR Cryptol. ePrint Arch., 2012

Unprovable Security of Two-Message Zero Knowledge.
IACR Cryptol. ePrint Arch., 2012

The Knowledge Tightness of Parallel Zero-Knowledge.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Black-Box Constructions of Composable Protocols without Set-Up.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Crowd-Blending Privacy.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

A Unified Framework for UC from Only OT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

I'm Doing as Well as I Can: Modeling People as Rational Finite Automata.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Algorithmic rationality: adding cost of computation to game theory.
SIGecom Exch., 2011

I Don't Want to Think About it Now:Decision Theory With Costly Computation
CoRR, 2011

Towards Non-Black-Box Lower Bounds in Cryptography.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Concurrent Security and Non-malleability.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Reasoning about justified belief.
Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-2011), 2011

Limits of provable security from standard assumptions.
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011

Constant-round non-malleable commitments from any one-way function.
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011

Renegotiation-Safe Protocols.
Proceedings of the Innovations in Computer Science, 2011

Approximately Strategy-Proof Voting.
Proceedings of the IJCAI 2011, 2011

The Randomness Complexity of Parallel Repetition.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

2010
Private Coins versus Public Coins in Zero-Knowledge Proof Systems.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

An Efficient Parallel Repetition Theorem.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Concurrent Non-Malleable Zero Knowledge Proofs.
Proceedings of the Advances in Cryptology, 2010

Game theory with costly computation: formulation and application to protocol security.
Proceedings of the Behavioral and Quantitative Game Theory, 2010

2009
Black-Box Constructions of Two-Party Protocols from One-Way Functions.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

An epistemic characterization of zero knowledge.
Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-2009), 2009

A logical characterization of iterated admissibility.
Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-2009), 2009

A unified framework for concurrent security: universal composability from stand-alone non-malleability.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

Non-malleability amplification.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

Iterated Regret Minimization: A New Solution Concept.
Proceedings of the IJCAI 2009, 2009

On the Composition of Public-Coin Zero-Knowledge Protocols.
Proceedings of the Advances in Cryptology, 2009

2008
New and Improved Constructions of Nonmalleable Cryptographic Protocols.
SIAM J. Comput., 2008

Concurrent Nonmalleable Commitments.
SIAM J. Comput., 2008

Iterated Regret Minimization: A More Realistic Solution Concept
CoRR, 2008

Game Theory with Costly Computation
CoRR, 2008

On Constant-Round Concurrent Zero-Knowledge.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Concurrent Non-malleable Commitments from Any One-Way Function.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Precise Concurrent Zero Knowledge.
Proceedings of the Advances in Cryptology, 2008

Adaptive One-Way Functions and Applications.
Proceedings of the Advances in Cryptology, 2008

2007
Universally Composable Security with Global Setup.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

An efficient parallel repetition theorem for Arthur-Merlin games.
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007

Cryptography from Sunspots: How to Use an Imperfect Reference String.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007

Relations Among Notions of Non-malleability for Encryption.
Proceedings of the Advances in Cryptology, 2007

Bounded CCA2-Secure Encryption.
Proceedings of the Advances in Cryptology, 2007

2006
A precise computational approach to knowledge.
PhD thesis, 2006

Local zero knowledge.
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006

Input-Indistinguishable Computation.
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006

Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.
Proceedings of the Advances in Cryptology, 2006

Parallel Repetition of Zero-Knowledge Proofs and the Possibility of Basing Cryptography on NP-Hardness.
Proceedings of the 21st Annual IEEE Conference on Computational Complexity (CCC 2006), 2006

2005
New and improved constructions of non-malleable cryptographic protocols.
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005

Concurrent Non-Malleable Commitments.
Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science, 2005

Unconditional Characterizations of Non-interactive Zero-Knowledge.
Proceedings of the Advances in Cryptology, 2005

Secure Computation Without Authentication.
Proceedings of the Advances in Cryptology, 2005

2004
On the Possibility of One-Message Weak Zero-Knowledge.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Bounded-concurrent secure multi-party computation with a dishonest majority.
Proceedings of the 36th Annual ACM Symposium on Theory of Computing, 2004

Universally Composable Protocols with Relaxed Set-Up Assumptions.
Proceedings of the 45th Symposium on Foundations of Computer Science, 2004

2003
Bounded-Concurrent Secure Two-Party Computation in a Constant Number of Rounds.
Proceedings of the 44th Symposium on Foundations of Computer Science, 2003

Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition.
Proceedings of the Advances in Cryptology, 2003

On Deniability in the Common Reference String and Random Oracle Model.
Proceedings of the Advances in Cryptology, 2003


  Loading...