Ronald Cramer

Affiliations:
  • National Research Institute for Mathematics and Computer Science, Amsterdam, Netherlands


According to our database1, Ronald Cramer authored at least 99 papers between 1993 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment.
J. Medical Syst., 2022

Vector Commitments over Rings and Compressed Σ-Protocols.
IACR Cryptol. ePrint Arch., 2022

Vector Commitments over Rings and Compressed $\varSigma $-Protocols.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

2021
Mildly Short Vectors in Cyclotomic Ideal Lattices in Quantum Polynomial Time.
J. ACM, 2021

A Compressed Σ-Protocol Theory for Lattices.
IACR Cryptol. ePrint Arch., 2021

Secure Computation over Integers Modulo Powers of Two.
ERCIM News, 2021

Asymptotically-Good Arithmetic Secret Sharing over $\mathbb {Z}/p^{\ell }\mathbb {Z}$ with Strong Multiplication and Its Applications to Efficient MPC.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

A Compressed $\varSigma $-Protocol Theory for Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Compressing Proofs of k-Out-Of-n Partial Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Compressed $\varSigma $-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Improved Single-Round Secure Multiplication Using Regenerating Codes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex.
IEEE Trans. Inf. Theory, 2020

Compressed Sigma-Protocols for Bilinear Circuits and Applications to Logarithmic-Sized Transparent Threshold Signature Schemes.
IACR Cryptol. ePrint Arch., 2020

Compressed Σ-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.
IACR Cryptol. ePrint Arch., 2020

Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z.
IACR Cryptol. ePrint Arch., 2020

On the Complexity of Arithmetic Secret Sharing.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Compressed $\varSigma $-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over $\mathbb {Z}/p^k\mathbb {Z} $.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC.
IACR Cryptol. ePrint Arch., 2019

A note on short invertible ring elements and applications to cyclotomic and trinomials number fields.
IACR Cryptol. ePrint Arch., 2019

Efficient Information-Theoretic Secure Multiparty Computation over Z/p<sup>k</sup>Z via Galois Rings.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

2018
SPDℤ<sub>2<sup>k</sup></sub>: Efficient MPC mod 2<sup>k</sup> for Dishonest Majority.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Amortized Complexity of Information-Theoretically Secure MPC Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model.
Proceedings of the Information Theoretic Security - 10th International Conference, 2017

Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Short Stickelberger Class Relations and Application to Ideal-SVP.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack.
IACR Cryptol. ePrint Arch., 2016

On Multi-Point Local Decoding of Reed-Muller Codes.
Electron. Colloquium Comput. Complex., 2016

Recovering Short Generators of Principal Ideals in Cyclotomic Rings.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Squares of Random Linear Codes.
IEEE Trans. Inf. Theory, 2015

A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations.
IEEE Trans. Inf. Forensics Secur., 2015

On the Amortized Complexity of Zero-knowledge Protocols.
IACR Cryptol. ePrint Arch., 2015

An Improvement on the Hasse-Weil Bound and applications to Character Sums, Cryptography and Coding.
CoRR, 2015

Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Secure Multiparty Computation and Secret Sharing.
Cambridge University Press, ISBN: 9781107043053, 2015

2014
Optimal Algebraic Manipulation Detection Codes.
IACR Cryptol. ePrint Arch., 2014

Torsion Limits and Riemann-Roch Systems for Function Fields and Applications.
IACR Cryptol. ePrint Arch., 2014

On powers of codes.
IACR Cryptol. ePrint Arch., 2014

2013
Bounds on the Threshold Gap in Secret Sharing and its Applications.
IEEE Trans. Inf. Theory, 2013

On secret sharing with nonlinear product reconstruction.
IACR Cryptol. ePrint Arch., 2013

2012
Asymptotic Bound for Multiplication Complexity in the Extensions of Small Finite Fields.
IEEE Trans. Inf. Theory, 2012

Bounds on the Threshold Gap in Secret Sharing over Small Fields.
IACR Cryptol. ePrint Arch., 2012

DDH-Like Assumptions Based on Extension Rings.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

The arithmetic codex.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012

2011
The Arithmetic Codex: Theory and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

2009
Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems.
IACR Cryptol. ePrint Arch., 2009

Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over <i>Any</i> Fixed Finite Field.
Proceedings of the Advances in Cryptology, 2009

On the Amortized Complexity of Zero-Knowledge Protocols.
Proceedings of the Advances in Cryptology, 2009

2008
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes.
IEEE Trans. Inf. Theory, 2008

Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
Proceedings of the Advances in Cryptology, 2008

Strongly Multiplicative Ramp Schemes from High Degree Rational Points on Curves.
Proceedings of the Advances in Cryptology, 2008

2007
Atomic Secure Multi-party Multiplication with Low Communication.
Proceedings of the Advances in Cryptology, 2007

Secure Computation from Random Error Correcting Codes.
Proceedings of the Advances in Cryptology, 2007

07381 Abstracts Collection -- Cryptography.
Proceedings of the Cryptography, 16.09. - 21.09.2007, 2007

07381 Executive Summary - Cryptography.
Proceedings of the Cryptography, 16.09. - 21.09.2007, 2007

A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra.
Proceedings of the Advances in Cryptology, 2007

Bounded CCA2-Secure Encryption.
Proceedings of the Advances in Cryptology, 2007

2006
A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security.
IACR Cryptol. ePrint Arch., 2006

Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields.
Proceedings of the Advances in Cryptology, 2006

Asymptotically Optimal Two-Round Perfectly Secure Message Transmission.
Proceedings of the Advances in Cryptology, 2006

2005
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields.
Proceedings of the Advances in Cryptology, 2005

On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 2005

Contemporary cryptology.
Advanced courses in mathematics : CRM Barcelona, Birkhäuser, ISBN: 978-3-7643-7294-1, 2005

2004
Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

2003
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack.
SIAM J. Comput., 2003

Efficient Multi-party Computation over Rings.
Proceedings of the Advances in Cryptology, 2003

2002
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups.
Proceedings of the Advances in Cryptology, 2002

Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments.
Proceedings of the Advances in Cryptology, 2002

2001
Universal Hash Proofs and and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
Electron. Colloquium Comput. Complex., 2001

Multiparty Computation from Threshold Homomorphic Encryption.
Proceedings of the Advances in Cryptology, 2001

On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase.
Proceedings of the Advances in Cryptology, 2001

Secure Distributed Linear Algebra in a Constant Number of Rounds.
Proceedings of the Advances in Cryptology, 2001

2000
On the Complexity of Verifiable Secret Sharing and Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2000

On the complexity of verifiable secret sharing and multiparty computation.
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions.
Proceedings of the Public Key Cryptography, 2000

General Secure Multi-party Computation from any Linear Secret-Sharing Scheme.
Proceedings of the Advances in Cryptology, 2000

1999
Efficient Multiparty Computations Secure Against an Adaptive Adversary.
Proceedings of the Advances in Cryptology, 1999

Signature Schemes Based on the Strong RSA Assumption.
Proceedings of the CCS '99, 1999

1998
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology, 1998

Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free?
Proceedings of the Advances in Cryptology, 1998

Introduction to Secure Computation.
Proceedings of the Lectures on Data Security, 1998

1997
Linear Zero-Knowledge - A Note on Efficient Zero-Knowledge Proofs and Arguments.
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997

A Secure and Optimally Efficient Multi-Authority Election Scheme.
Proceedings of the Advances in Cryptology, 1997

Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation.
Proceedings of the Advances in Cryptology, 1997

1996
On Monotone Function Closure of Statistical Zero-Knowledge.
IACR Cryptol. ePrint Arch., 1996

Efficient and Provable Security Amplifications.
Proceedings of the Security Protocols, 1996

Multi-Autority Secret-Ballot Elections with Linear Work.
Proceedings of the Advances in Cryptology, 1996

New Generation of Secure and Practical RSA-Based Signatures.
Proceedings of the Advances in Cryptology, 1996

1995
Secure Signature Schemes based on Interactive Protocols.
Proceedings of the Advances in Cryptology, 1995

1994

Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols.
Proceedings of the Advances in Cryptology, 1994

1993
Improved Privacy in Wallets with Observers (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993


  Loading...