Sophia Yakoubov

Orcid: 0000-0001-7958-8537

Affiliations:
  • Aarhus University, Denmark


According to our database1, Sophia Yakoubov authored at least 37 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Secure Communication in Dynamic Incomplete Networks.
IACR Cryptol. ePrint Arch., 2023

Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels.
IACR Cryptol. ePrint Arch., 2023

Broadcast-Optimal Four-Round MPC in the Plain Model.
IACR Cryptol. ePrint Arch., 2023

Taming Adaptivity in YOSO Protocols: The Modular Way.
IACR Cryptol. ePrint Arch., 2023

2022
Threshold-Optimal MPC With Friends and Foes.
IACR Cryptol. ePrint Arch., 2022

Towards Efficient YOSO MPC Without Setup.
IACR Cryptol. ePrint Arch., 2022

Minimizing Setup in Broadcast-Optimal Two Round MPC.
IACR Cryptol. ePrint Arch., 2022

The State of the Union: Union-Only Signatures for Data Aggregation.
IACR Cryptol. ePrint Arch., 2022

Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round.
IACR Cryptol. ePrint Arch., 2022

2021
On Sufficient Oracles for Secure Computation with Identifiable Abort.
IACR Cryptol. ePrint Arch., 2021

The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT.
IACR Cryptol. ePrint Arch., 2021

YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles.
IACR Cryptol. ePrint Arch., 2021

Count Me In! Extendability for Threshold Ring Signatures.
IACR Cryptol. ePrint Arch., 2021

Random-Index PIR and Applications.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

Broadcast-Optimal Two Round MPC with an Honest Majority.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Broadcast Secret-Sharing, Bounds and Applications.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
Studies in authentication
PhD thesis, 2020

Stronger Notions and a More Efficient Construction of Threshold Ring Signatures.
IACR Cryptol. ePrint Arch., 2020

Random-index PIR with Applications to Large-Scale Secure MPC.
IACR Cryptol. ePrint Arch., 2020

Bounds on Ad Hoc Threshold Encryption.
IACR Cryptol. ePrint Arch., 2020

Broadcast-Optimal Two Round MPC with an Honest Majority.
IACR Cryptol. ePrint Arch., 2020

Stronger Security and Constructions of Multi-designated Verifier Signatures.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

2019
Stronger Notions and Constructions for Multi-Designated Verifier Signatures.
IACR Cryptol. ePrint Arch., 2019

2018
Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC.
IACR Cryptol. ePrint Arch., 2018

Universally Composable Accumulators.
IACR Cryptol. ePrint Arch., 2018

Fuzzy Password-Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Fuzzy Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2017

Accumulators with Applications to Anonymity-Preserving Revocation.
IACR Cryptol. ePrint Arch., 2017

2016
Cryptography for Big Data Security.
IACR Cryptol. ePrint Arch., 2016

Catching MPC Cheaters: Identification and Openability.
IACR Cryptol. ePrint Arch., 2016

Secure Multiparty Computation for Cooperative Cyber Risk Assessment.
Proceedings of the IEEE Cybersecurity Development, 2016

2015
Automated Assessment of Secure Search Systems.
ACM SIGOPS Oper. Syst. Rev., 2015

HETest: A Homomorphic Encryption Testing Framework.
IACR Cryptol. ePrint Arch., 2015

Efficient Asynchronous Accumulators for Distributed PKI.
IACR Cryptol. ePrint Arch., 2015

2014
A Decentralized Public Key Infrastructure with Identity Retention.
IACR Cryptol. ePrint Arch., 2014

A survey of cryptographic approaches to securing big-data analytics in the cloud.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014


  Loading...